A leading global logistics company responsible for managing transportation and logistics for one of the recent Olympics Games sought to ensure their online systems were resilient against potential DDoS attacks.
The enterprise is dependent on Route 53, AWS’s DNS service, and Akamai’s content delivery network (CDN) and App & API Protector (APP) for initial cybersecurity. The Akamai web application firewall (WAF) protects against layer seven attacks and is integrated with Datadome to prevent bot attacks. Requests that are not blocked by the WAF or not already cached on Akamai’s servers are routed to Cloudflare’s Magic Transit, which filters network layer traffic to the on-premises environment. Finally, that traffic is inspected by local firewalls before reaching the servers providing the requested content.
To comprehensively validate the company’s protective measures, we designed 12 different DDoS attack scenarios – six targeting the network layer and six targeting the application layer.
The first set of simulated attacks tested the network layer (L3/4) protection of Cloudflare’s Magic Transit service, while the second set challenged Akamai’s WAF DoS policy and rate limiting rules intended to protect against application layer (L7) attacks. Both average and burst rate limit thresholds were tested in the HTTPS flood-based attack vector simulations, with rates adjusted depending on the specific asset and incrementally increased to exceed predefined thresholds. The test also examined the WAF’s body size limitation rule, which drops all requests with a certain body size.
Five of the DDoS network layer attacks were detected and mitigated, but one – a TCP Middlebox Reflection Flood attack – caused steady service downtime.
Of the application layer attacks, only two scenarios were detected and mitigated. One scenario, a Large File Upload (LFU) attack, was detected, but no mitigation measures were in place to block the attack. The remaining three scenarios – two GET Floods and a POST Flood – were neither detected nor mitigated, disrupting service availability.
To address the identified protection gaps, we provided the corporation with the following recommendations:
Check out these resources for more information
about our DDoS testing solutons for your business.