Microsoft claims to have mitigated a record-breaking 2.4 Tbps DDoS attack targeting one of its Azure customers in Europe during the last week of August.

The company said the attack was 140% larger the highest volume of attack bandwidth recorded by Microsoft in 2020 and greater than any network volumetric event previously detected on Azure. It also outperforms the previous largest DDoS attack, which peaked at 2.3 Tbps and was directed against Amazon Web Services (AWS) last year.

He said the attack traffic came from around 70,000 sources and from several countries in the Asia-Pacific region, including Malaysia, Vietnam, Japan and China, as well as the United States. The attack lasted for over 10 minutes with very short bursts of bursts, each increasing in seconds to terabit volumes.

The company monitored three main peaks, the first at 2.4 Tbps, the second at 0.55 Tbps, and the third at 1.7 Tbps.

Microsoft’s attack mitigation lifecycle is orchestrated by its control plane logic that dynamically allocates mitigation resources to the most optimal locations, closest to the sources of attack. This meant that the attack traffic, which originated in the Asia-Pacific region and the United States, did not reach the client region, but rather was attenuated in the source countries.

“Azure DDoS Mitigation uses rapid detection and mitigation of large-scale attacks by continuously monitoring our infrastructure at many points in the network,” said Amir Dahan, senior program manager at Azure Networking.

“When deviations from baselines are extremely large, our DDoS control plan logic goes through the normal detection steps, necessary for low volume flooding, to immediately trigger mitigation. This ensures the fastest mitigation time and prevents collateral damage from such large attacks. “

Dahan added that the customer did not experience any impact or downtime, but if he had managed his own data center instead of using Azure, he would most likely have suffered significant financial damage as well as others. intangible costs.

In 2020, Google revealed that its infrastructure had absorbed a 2.5 Tbps DDoS attack three years earlier. The attack was the culmination of a six-month campaign launched by China-backed hackers who used multiple attack methods, which ultimately had no material impact.

Featured Resources

Thales 2021 access management index: global edition

The challenges of trusted access in a cloud-driven world

Free download

Transforming higher education in the digital age

The future is yours

Free download

Build a native cloud infrastructure, hybrid-multi cloud

Prepare for multi-cloud hybrid databases, AI and machine learning workloads

Free download

The next biggest shopping destination is the cloud

Know why retail businesses need to migrate to the cloud

Free download

Leave a Reply

Your email address will not be published.