Cloudflare Docs
Support
Support
Visit Support on GitHub
Set theme to dark (⇧+D)

Understanding Cloudflare DDoS protection

​​ Overview

Distributed Denial of Service attack (DDoS) seeks to make an online service unavailable to its end users.  For all plan types, Cloudflare provides unmetered mitigation of DDoS attacks at Layer 3, 4, and 7. Cloudflare does not bill by attack size and does not have a cap on attack size, type, or duration.

Cloudflare’s network is built to automatically monitor and mitigate large  DDoS attacks. Caching your content at Cloudflare also protects your website against small DDoS attacks, but uncached assets require additional manual response to DDoS attacks.

Additionally, Cloudflare helps mitigate smaller DDoS attacks:

  • For zones on any plan, when the HTTP error rate is above the High (default) sensitivity level of 1,000 errors-per-second rate threshold. You can decrease the sensitivity level by configuring the HTTP DDoS Attack Protection Managed Ruleset.
  • For zones on Pro, Business and Enterprise plans, Cloudflare performs an additional check for better detection accuracy: the errors-per-second rate must also be at least five times the normal origin traffic levels.

Cloudflare determines the error rate based on all HTTP errors in the 52X range (Internal Server Error) and in the 53X range, except for error 530.

Mitigations of HTTP DDoS attacks are shown in the Security Events dashboard as HTTP DDoS events. These events are also available via Cloudflare Logs.

Currently, for DDoS mitigations based on HTTP error rate, customers cannot exclude specific HTTP error codes.

Learn more about  Famous DDoS Attacks and  DDoS at the Cloudflare Learning Center. You can also review DDoS case studies in the related resources section at the end of this article.


​​ The Cloudflare HTTP DDoS Attack Protection Managed Ruleset

The Cloudflare HTTP DDoS Attack Protection Managed Ruleset is a set of pre-configured rules used to match known attack patterns, known attack tools, suspicious patterns, protocol violations, requests causing large amounts of origin errors, excessive traffic hitting the origin/cache, and additional attack vectors at the application layer on the edge. The ruleset is available for Cloudflare customers on all plans and is enabled by default.

If you are expecting large spikes of legitimate traffic, consider customizing your DDoS protection settings to avoid false positives, where legitimate traffic is falsely identified as attack traffic and blocked/challenged.

Learn more about the Cloudflare HTTP DDoS Attack Protection Managed Ruleset and the available configuration settings in the Cloudflare Developers portal.

For more information on the actions applied by HTTP DDoS attack protection systems, refer to HTTP DDoS Attack Protection parameters: Action.


​​ The Cloudflare Network-layer DDoS Attack Protection Managed Ruleset

The Cloudflare Network-layer DDoS Attack Protection Managed Ruleset is a set of pre-configured rules used to match known DDoS attack vectors at levels 3 and 4 of the OSI model. The ruleset is available for Cloudflare customers on all plans and is enabled by default.

Learn more about the Cloudflare Network-layer DDoS Attack Protection Managed Ruleset and the available configuration settings in the Cloudflare Developers portal.

For more information on the actions applied by L3/4 DDoS attack protection systems, refer to Network-layer DDoS Attack Protection parameters: Action.


​​ Determine if you are under DDoS attack

Common signs that you are under DDoS attack include:

  • Your site is offline or slow to respond to requests.
  • There are unexpected spikes in the graph of Requests Through Cloudflare or Bandwidth in your Cloudflare Analytics app.
  • There are strange requests in your origin web server logs that don’t match normal visitor behavior.

​​ Is Cloudflare attacking me?

There are two common scenarios where Cloudflare is falsely perceived to attack your site:

Ideally, because Cloudflare is a reverse proxy, your hosting provider observes attack traffic connecting from  Cloudflare IP addresses. In contrast, if you notice connections from IP addresses that do not belong to Cloudflare, the attack is direct to your origin web server. Cloudflare cannot stop attacks directly to your origin IP address because the traffic bypasses Cloudflare’s network.


​​ Case Studies: