
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Mon, 13 Apr 2026 18:39:59 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Reaffirming our commitment to free]]></title>
            <link>https://blog.cloudflare.com/cloudflares-commitment-to-free/</link>
            <pubDate>Fri, 27 Sep 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Today Cloudflare reaffirms its commitment to offering a robust Free service tier that continues to improve. We share why Free is a cornerstone of our business strategy, and how it contributes to building a better Internet.
 ]]></description>
            <content:encoded><![CDATA[ <p></p><p>Cloudflare launched our free tier <a href="https://www.cloudflare.com/press-releases/2010/cloudflare-launches-at-techcrunch-disrupt/"><u>at the same time our company launched</u></a> — fourteen years ago, on September 27, 2010. Of course, a bit has changed since then — there are now millions of Internet properties behind Cloudflare. As we’ve grown in size and amassed millions of free customers, one of the questions we often get asked is: how can Cloudflare afford to do this at such scale?</p><p>Cloudflare always has, and always will, offer a generous free version for public-facing applications (<a href="https://www.cloudflare.com/application-services/products/"><u>Application Services</u></a>), internal private networks and people (<a href="https://www.cloudflare.com/zero-trust/products/"><u>Cloudflare One</u></a>), and developer tools (<a href="https://www.cloudflare.com/developer-platform/products/"><u>Developer Platform</u></a>). Counterintuitively: our free service actually helps us keep our costs lower. Not only is it mission-aligned, our free tier is business-aligned. We want to make abundantly clear: our free plan is here to stay, and we reaffirmed that commitment this week with 15 releases across our product portfolio that make the Free plan even better.</p>
    <div>
      <h2>Understanding our Cost of Goods Sold</h2>
      <a href="#understanding-our-cost-of-goods-sold">
        
      </a>
    </div>
    <p>To understand the economics of Free, you need to understand our Cost of Goods Sold (COGS). Cloudflare hasn’t outsourced its <a href="https://www.cloudflare.com/network"><u>network</u></a> — we built it ourselves, and it spans more than 330 cities. We design and ship our own <a href="https://blog.cloudflare.com/gen-12-servers"><u>hardware</u></a> across the world, we <a href="https://www.cloudflare.com/en-gb/partners/peering-portal/"><u>interconnect</u></a> with more than 12,500 networks, and we manage over 300 Tbps of network capacity. We even have a dedicated <a href="https://blog.cloudflare.com/backbone2024/"><u>backbone</u></a> that spans the globe.</p><p>There are three major costs of running our network, which together comprise about 80% of our COGS. First and largest is bandwidth: the traffic that traverses our network. Then there is hardware: the servers that process traffic. And third are colocation costs: the power and space at the data centers where we house our servers. There are other parts of COGS, too, like our SRE team that keeps the network running, and our payment processor fees, without which we couldn’t collect revenue.</p><p>To get traffic across the Internet for a network of our scale, we need a lot of bandwidth. Typically, a network like ours would pay third-party transit networks and Internet Service Providers (ISPs) to transmit data anywhere on the Internet. But there are thousands of ISPs that we don’t have to pay at all, and hundreds that also offer us space in their data center at no cost. How did we manage that? The surprising answer: Free.</p>
    <div>
      <h2>How our Free services keep costs low</h2>
      <a href="#how-our-free-services-keep-costs-low">
        
      </a>
    </div>
    <p>Imagine you run an ISP serving your local community. Your job is to connect your customers to the Internet. You notice that your customers are often visiting sites behind Cloudflare, which sits in front of roughly <a href="https://w3techs.com/technologies/history_overview/proxy/all/q"><u>20% of the web</u></a>. You need to deliver those webpages and facilitate connections to the applications behind Cloudflare, but right now you have to pay a transit provider to reach them. Instead, you could choose to <a href="https://www.internetsociety.org/resources/doc/2020/explainer-what-is-internet-peering/"><u>peer</u></a> directly with Cloudflare and exchange traffic at no cost.</p><p>Cloudflare is one of the <a href="https://bgp.tools/rankings/all?sort=peering"><u>most peered networks in the world</u></a>. We freely exchange traffic with thousands of ISPs, who in turn benefit because they can cut out a third-party transit provider to reach the millions of sites and applications behind Cloudflare.</p><p>Continuing with this hypothetical, if as an ISP, your customers pay for Internet connectivity based on data usage (a common model outside of Western Europe and the US), your revenue scales with data consumption. One simple way to increase data consumption? Make the Internet faster! Hosting Cloudflare’s servers in your facility, as close to your users as possible, reduces latency for millions of websites and apps. So it’s in your best interest to host Cloudflare’s servers in your data centers, too.</p><p>We have hundreds of ISP partnerships that look just like that. The value ISPs get from Cloudflare stems from the breadth of the web that sits behind Cloudflare, a number driven by our Free customers. This arrangement is a big part of why we have a free service, and is part of what enables us to continue to offer one. PS: If you really are an operator for a local ISP and don’t partner with us yet, please connect with us through our <a href="https://www.cloudflare.com/partners/peering-portal/"><u>peering portal</u></a>!</p><p>These days, we are at such a scale that the traffic our customers generate requires much more capacity than can fit within our ISP partners. To reliably serve our enterprise customers, we operate in multiple facilities in every major Internet hub city. And yet, the traffic patterns of our enterprise customers are typically very predictable. They usually follow a diurnal cycle, with peaks and troughs throughout a day. Enterprise customer traffic is prioritized and served as close to end users as possible, regardless of the time of day. But our Free customers use off-cycle headroom. That’s why we’re able to continue to offer unmetered bandwidth on the Free plan: we serve the traffic from across our network, wherever there is spare room. It might not have quite the same performance as our enterprise traffic, but it’s still reliable and fast.</p><p>There do have to be some rules for this to continue to work, however. Free traffic needs to remain a manageable proportion of our total traffic. To ensure that remains true, and that we can continue to offer unmetered traffic to Free customers at no cost, we have to be opinionated about what kind of traffic we serve for free. Our <a href="https://www.cloudflare.com/service-specific-terms-application-services/#content-delivery-network-terms"><u>terms of service</u></a> specify that large assets (like videos) are not supported on our Free plan. So we require that customers pushing large files and videos move onto one of our paid services, like <a href="https://developers.cloudflare.com/images/"><u>Images</u></a> and <a href="https://developers.cloudflare.com/stream/"><u>Stream</u></a>.</p>
    <div>
      <h2>Free customers help us build better products and grow our business</h2>
      <a href="#free-customers-help-us-build-better-products-and-grow-our-business">
        
      </a>
    </div>
    <p>The benefits of our Free plan extend well beyond direct economics.</p><p>Our Free plan gives Cloudflare access to unique threat intelligence. A wide surface area exposes our network to diverse traffic and attacks that we wouldn’t otherwise see, often allowing us to identify potential security and reliability issues at the earliest stage. Like an immune system, we learn from these attacks and adapt to improve our products for all customers. This is a special competitive advantage. <a href="https://radar.cloudflare.com/security-and-attacks"><u>Visibility into attacks</u></a> allows us to build products that no one else could.</p><p>Our Free customers help us do quality assurance (QA) quickly. Free customers are often the first to try new products and features. When we launch something new, we get signal immediately and at an incredible scale. We use that signal to swiftly address bugs and iterate on our products. </p><p>Offering a Free plan challenges us to build more intuitive products. Free customers represent a broad audience, from tech enthusiasts to those simply looking to secure their website or build an application. Building for a broad spectrum of users forces us to create more user-friendly tools for everyone.</p><p>Offering a Free service has other benefits, too. Some of our strongest customer advocates are folks that used our Free plan on their hobby projects before bringing Cloudflare with them to work. Some of them even end up working at Cloudflare!</p>
    <div>
      <h2>Our free plan will keep getting better</h2>
      <a href="#our-free-plan-will-keep-getting-better">
        
      </a>
    </div>
    <p>Our Free offering is a flywheel that helps make Cloudflare’s products, team, and cost structure more efficient. We pay back these efficiencies by continuing to improve our free offerings. Just this week, we’ve announced 16 updates that make our Free plans even better:</p><ul><li><p>Free customers can <a href="https://blog.cloudflare.com/cloudflare-ai-audit-control-ai-content-crawlers?/"><u>audit and control the AI models accessing their content</u></a>.</p></li><li><p><a href="https://developers.cloudflare.com/turnstile/"><u>Turnstile</u></a>, our privacy-first CAPTCHA alternative available to everyone, gets more accurate with <a href="https://blog.cloudflare.com/turnstile-ephemeral-ids-for-fraud-detection?"><u>granular, client-level identification</u></a>.</p></li><li><p>Free customers now have access to our <a href="https://www.cloudflare.com/zero-trust/products/casb/"><u>Cloud Access Security Broker</u></a> (CASB), <a href="https://www.cloudflare.com/zero-trust/products/dlp/"><u>Data Loss Prevention</u></a> (DLP), <a href="https://developers.cloudflare.com/cloudflare-one/insights/dex/"><u>Digital Experience Monitoring</u></a> (DEX), and <a href="https://developers.cloudflare.com/magic-network-monitoring/"><u>Magic Network Monitoring</u></a> (MNM) tools, for up to 50 seats.</p></li><li><p>A new version of <a href="https://developers.cloudflare.com/waf/managed-rules/check-for-exposed-credentials/"><u>Leaked Credential Checks</u></a> (LCC) is available to all customers to help mitigate account takeover (ATO) attacks.</p></li><li><p>All customers can now monitor third-party scripts with <a href="https://developers.cloudflare.com/page-shield/detection/monitor-connections-scripts/"><u>Page Shield Script Monitor</u></a>.</p></li><li><p>Free customers can use <a href="https://developers.cloudflare.com/api-shield/security/schema-validation/"><u>API Shield’s Schema Validation</u></a> to ensure only valid requests to their API make it through to the origin.</p></li><li><p>Free customers get more robust analytics, with versions of <a href="https://developers.cloudflare.com/waf/analytics/security-analytics/"><u>Security Analytics</u></a> and <a href="https://developers.cloudflare.com/dns/additional-options/analytics/"><u>DNS GraphQL</u></a> for everyone.</p></li><li><p>All customers can now log in to the Cloudflare Dashboard using <a href="https://blog.cloudflare.com/a-safer-internet-with-cloudflare/?"><u>Sign in with Google</u></a>.</p></li><li><p>Free customers using our Terraform provider to configure their infrastructure will now benefit from <a href="https://blog.cloudflare.com/automatically-generating-cloudflares-terraform-provider?"><u>autogenerated API SDKs</u></a>.</p></li><li><p><a href="https://developers.cloudflare.com/calls/turn/overview/"><u>Cloudflare Calls managed TURN service</u></a> is now GA and free up to 1,000 GB per month.</p></li><li><p>All customers will benefit from the introduction of <a href="https://blog.cloudflare.com/new-standards?"><u>Zstandard compression</u></a>, which improves web performance by compressing up to 42% faster than Brotli.</p></li><li><p>Free customer traffic is now more private as we roll out <a href="https://developers.cloudflare.com/ssl/edge-certificates/ech/"><u>Encrypted Client Hello</u></a> (ECH) which obfuscates the Server Name Identifier (SNI) during a TLS handshake.</p></li><li><p>All customers can store and query 3 days of logs from their <a href="https://workers.cloudflare.com/"><u>Cloudflare Worker</u></a>.</p></li><li><p>Requests made through <a href="https://developers.cloudflare.com/workers/runtime-apis/bindings/service-bindings/"><u>Service Bindings</u></a> and to <a href="https://developers.cloudflare.com/workers/observability/logging/tail-workers/"><u>Tail Workers</u></a> are now free.</p></li><li><p>Cloudflare <a href="https://developers.cloudflare.com/images/"><u>Image Optimization</u></a> is now available for free to all Cloudflare customers.</p></li><li><p>Free domains just got 45% faster with<a href="https://blog.cloudflare.com/introducing-speed-brain?_gl=1*1i8aixl*_gcl_aw*R0NMLjE3MjczMDQyMTIuQ2p3S0NBanc2YzYzQmhBaUVpd0FGMEVIMUQ3S1gzNVhCOTZXWWxhWU45UkNOYmJrZER5ZmxzemQybkVZVExvS3lfbU43SWp2SERhWGZob0NEVlFRQXZEX0J3RQ..*_gcl_dc*R0NMLjE3MjczMDQyMTIuQ2p3S0NBanc2YzYzQmhBaUVpd0FGMEVIMUQ3S1gzNVhCOTZXWWxhWU45UkNOYmJrZER5ZmxzemQybkVZVExvS3lfbU43SWp2SERhWGZob0NEVlFRQXZEX0J3RQ..*_gcl_au*MTgyNjIxMjU3MC4xNzIyMjMzNDc3*_ga*MjIyMTI3YmItOWQxNC00ZDcyLTljZjgtNTg2NmZiNWIyZjVh*_ga_SQCRB0TXZW*MTcyNzQ3OTM3Ni43NC4xLjE3Mjc0ODExNDYuMjkuMC4w/"> <u>Speed Brain</u></a> enabled.</p></li></ul><p>We offer a Free plan out of more than goodwill — it is a core business differentiator that helps us build better products, drive growth, and keep costs low. And it helps us advance our mission. Building a better Internet is a collective effort. Today, more than 30 million Internet properties, comprising some 20% of the web, sit behind Cloudflare. Our Free plan makes that portion of the web faster, more secure, and more efficient. Free is not just a commitment — it’s a cornerstone of our strategy.</p><p>Become part of a better Internet and <a href="https://www.cloudflare.com/plans/free/"><u>sign up for Cloudflare’s Free plan</u></a>.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3pyDxxVAHg0jqcZTj2TVmw/9f484c51ab42c627b549b4ef7640680e/BLOG-2528_2.png" />
          </figure><p></p> ]]></content:encoded>
            <category><![CDATA[Birthday Week]]></category>
            <category><![CDATA[Network Protection]]></category>
            <category><![CDATA[Network Services]]></category>
            <category><![CDATA[Free]]></category>
            <guid isPermaLink="false">P8TeQwTekaAHzlEGB8bLG</guid>
            <dc:creator>Nitin Rao</dc:creator>
            <dc:creator>Liam Reese</dc:creator>
            <dc:creator>James Allworth</dc:creator>
        </item>
        <item>
            <title><![CDATA[Advanced DNS Protection: mitigating sophisticated DNS DDoS attacks]]></title>
            <link>https://blog.cloudflare.com/advanced-dns-protection/</link>
            <pubDate>Thu, 07 Mar 2024 14:00:36 GMT</pubDate>
            <description><![CDATA[ We're proud to introduce the Advanced DNS Protection system, a robust defense mechanism designed to protect against the most sophisticated DNS-based DDoS attacks ]]></description>
            <content:encoded><![CDATA[ <p></p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/45qkI4SFbrq6NaNxYF5TJ/93dce3635461f42d02cafdb034b82bcd/image10-5.png" />
            
            </figure><p>We're proud to introduce the <a href="https://developers.cloudflare.com/ddos-protection/dns-protection/">Advanced DNS Protection</a> system, a robust defense mechanism designed to protect against the most sophisticated <a href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/">DNS-based DDoS attacks</a>. This system is engineered to provide top-tier security, ensuring your digital infrastructure remains resilient in the face of evolving threats.</p><p>Our existing systems have been successfully detecting and mitigating ‘simpler’ DDoS attacks against DNS, but they’ve struggled with the more complex ones. The Advanced DNS Protection system is able to bridge that gap by leveraging new techniques that we will showcase in this blog post.</p><p>Advanced DNS Protection is currently in beta and available for all <a href="https://www.cloudflare.com/network-services/products/magic-transit/">Magic Transit</a> customers at no additional cost. Read on to learn more about DNS DDoS attacks, how the new system works, and what new functionality is expected down the road.</p><p><a href="https://www.cloudflare.com/lp/advanced-dns-protection/">Register your interest</a> to learn more about how we can help keep your DNS servers protected, available, and performant.</p>
    <div>
      <h2>A third of all DDoS attacks target DNS servers</h2>
      <a href="#a-third-of-all-ddos-attacks-target-dns-servers">
        
      </a>
    </div>
    <p><a href="https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/">Distributed Denial of Service (DDoS) attacks</a> are a type of cyber attack that aim to disrupt and take down websites and other online services. When DDoS attacks succeed and websites are taken offline, it can lead to significant revenue loss and damage to reputation.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/3RNb2mpBnPswRBx7ye9HYG/7b07417272b43a163aa57d69fad50f0c/image5-13.png" />
            
            </figure><p>Distribution of DDoS attack types for 2023</p><p>One common way to disrupt and take down a website is to flood its servers with more traffic than it can handle. This is known as an <a href="https://www.cloudflare.com/learning/ddos/http-flood-ddos-attack/">HTTP flood attack</a>. It is a type of DDoS attack that targets the website <i>directly</i> with a lot of <a href="https://www.cloudflare.com/learning/ddos/glossary/hypertext-transfer-protocol-http/">HTTP requests</a>. According to our <a href="/ddos-threat-report-2023-q4">last DDoS trends report</a>, in 2023 our systems automatically mitigated 5.2 million HTTP DDoS attacks — accounting for 37% of all DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4WcaqGR3VhSaPbTOrbjIVJ/7d3ce83439c2b064b57436de14846a3c/image11-2.png" />
            
            </figure><p>Diagram of an HTTP flood attack</p><p>However, there is another way to take down websites: by targeting them <i>indirectly</i>. Instead of flooding the website servers, the threat actor floods the DNS servers. If the DNS servers are overwhelmed with more queries than their capacity, hostname to IP address translation fails and the website experiences an indirectly inflicted outage because the DNS server cannot respond to legitimate queries.</p><p>One notable example is the <a href="https://en.wikipedia.org/wiki/DDoS_attacks_on_Dyn">attack that targeted Dyn</a>, a DNS provider, in October 2016. It was a devastating DDoS attack launched by the infamous <a href="https://www.cloudflare.com/learning/ddos/glossary/mirai-botnet/">Mirai botnet</a>. It caused disruptions for major sites like Airbnb, Netflix, and Amazon, and it took Dyn an entire day to restore services. That’s a long time for service disruptions that can lead to significant reputation and revenue impact.</p><p>Over seven years later, Mirai attacks and DNS attacks are still incredibly common. In 2023, DNS attacks were the second most common attack type — with a 33% share of all DDoS attacks (4.6 million attacks). Attacks launched by Mirai-variant botnets were the fifth most common type of network-layer DDoS attack, accounting for 3% of all network-layer DDoS attacks.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7kZe6dABMA0r3nX1lE8rzJ/24540fe5470cbf6757cd6b1f0459a844/image2-22.png" />
            
            </figure><p>Diagram of a DNS query flood attack</p>
    <div>
      <h2>What are sophisticated DNS-based DDoS attacks?</h2>
      <a href="#what-are-sophisticated-dns-based-ddos-attacks">
        
      </a>
    </div>
    <p>DNS-based DDoS attacks can be easier to mitigate when there is a recurring pattern in each query. This is what’s called the “attack fingerprint”. Fingerprint-based mitigation systems can identify those patterns and then deploy a mitigation rule that surgically filters the attack traffic without impacting legitimate traffic.</p><p>For example, let’s take a scenario where an attacker sends a flood of DNS queries to their target. In this example, the attacker only randomized the source IP address. All other query fields remained consistent. The mitigation system detected the pattern (source port is 1024 and the queried domain is <code>example.com</code>) and will generate an ephemeral mitigation rule to filter those queries.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7lAewEZWMPO4Du0g14y97V/e1c663aaecfdefbf92867d180d08c89e/pasted-image-0-3.png" />
            
            </figure><p>A simplified diagram of the attack fingerprinting concept</p><p>However, there are DNS-based DDoS attacks that are much more sophisticated and randomized, lacking an apparent attack pattern. Without a consistent pattern to lock on to, it becomes virtually impossible to mitigate the attack using a fingerprint-based mitigation system. Moreover, even if an attack pattern is detected in a highly randomized attack, the pattern would probably be so generic that it would mistakenly mitigate legitimate user traffic and/or not catch the entire attack.</p><p>In this example, the attacker also randomized the queried domain in their DNS query flood attack. Simultaneously, a legitimate client (or server) is also querying <code>example.com</code>. They were assigned a random port number which happened to be 1024. The mitigation system detected a pattern (source port is 1024 and the queried domain is <code>example.com</code>) that caught only the part of the attack that matched the fingerprint. The mitigation system missed the part of the attack that queried other hostnames. Lastly, the mitigation system mistakenly caught legitimate traffic that happened to appear similar to the attack traffic.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/FK69kOH3wNkIxqZ9GolXV/0ca6c600de43c646efd46a17fa070a36/pasted-image-0--1-.png" />
            
            </figure><p>A simplified diagram of a randomized DNS flood attack</p><p>This is just one very simple example of how fingerprinting can fail in stopping randomized DDoS attacks. This challenge is amplified when attackers “launder” their attack traffic through reputable public DNS resolvers (a DNS resolver, also known as a recursive DNS server, is a <a href="https://www.cloudflare.com/learning/dns/dns-server-types/">type of DNS server</a> that is responsible for tracking down the IP address of a website from various other DNS servers). This is known as a DNS laundering attack.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/7tWhCkfhKqdiT1Tp4oXX7c/161b1bfcaa7be90301de140ffc15a97a/DNS-Resolution.png" />
            
            </figure><p>Diagram of the DNS resolution process</p><p>During a DNS laundering attack, the attacker queries subdomains of a real domain that is managed by the victim’s authoritative DNS server. The prefix that defines the subdomain is randomized and is never used more than once. Due to the randomization element, recursive DNS servers will never have a cached response and will need to forward the query to the victim’s authoritative DNS server. The authoritative DNS server is then bombarded by so many queries until it cannot serve legitimate queries or even crashes altogether.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/4qWoBkWf5pQ3vKwXd2VGdI/1abd687392cb0b0106a154b4fb5842d8/DNS-Laundering-attack.png" />
            
            </figure><p>Diagram of a DNS Laundering attack</p><p>The complexity of sophisticated DNS DDoS attacks lies in their paradoxical nature: while they are relatively easy to detect, effectively mitigating them is significantly more difficult. This difficulty stems from the fact that authoritative DNS servers cannot simply block queries from recursive DNS servers, as these servers also make legitimate requests. Moreover, the authoritative DNS server is unable to filter queries aimed at the targeted domain because it is a genuine domain that needs to remain accessible.</p>
    <div>
      <h2>Mitigating sophisticated DNS-based DDoS attacks with the Advanced DNS Protection system</h2>
      <a href="#mitigating-sophisticated-dns-based-ddos-attacks-with-the-advanced-dns-protection-system">
        
      </a>
    </div>
    <p>The rise in these types of sophisticated DNS-based DDoS attacks motivated us to develop a new solution — a solution that would better protect our customers and bridge the gap of more traditional fingerprinting approaches. This solution came to be the <a href="https://developers.cloudflare.com/ddos-protection/dns-protection/">Advanced DNS Protection</a> system. Similar to the <a href="https://developers.cloudflare.com/ddos-protection/tcp-protection/">Advanced TCP Protection</a> system, it is a software-defined system that we built, and it is powered by our stateful mitigation platform, <i>flowtrackd</i> (flow tracking daemon).</p><p>The Advanced DNS Protection system complements our <a href="https://developers.cloudflare.com/ddos-protection/#features">existing suite of DDoS defense systems</a>. Following the same approach as our other DDoS defense systems, the Advanced DNS Protection system is also a distributed system, and an instance of it runs on every Cloudflare server around the world. Once the system has been initiated, each instance can detect and mitigate attacks autonomously without requiring any centralized regulation. Detection and mitigation is instantaneous (zero seconds). Each instance also communicates with other instances on other servers in a data center. They <i>gossip</i> and share threat intelligence to deliver a comprehensive mitigation within each data center.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/73SgEYC7uAHd38YkYhOCV1/ee2c4024d83ac999f943703df1a6623b/pasted-image-0--2-.png" />
            
            </figure><p>Screenshots from the Cloudflare dashboard showcasing a DNS-based DDoS attack that was mitigated by the Advanced DNS Protection system </p><p>Together, our fingerprinting-based systems (the <a href="https://developers.cloudflare.com/ddos-protection/managed-rulesets/">DDoS protection managed rulesets</a>) and our stateful mitigation systems provide a robust multi-layered defense strategy to defend against the most sophisticated and randomized DNS-based DDoS attacks. The system is also customizable, allowing Cloudflare customers to tailor it for their needs. Review our <a href="https://developers.cloudflare.com/ddos-protection/dns-protection/">documentation</a> for more information on configuration options.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5Rb1rVLujDQK61hPgDvNuP/1ad93b101600e061c2217ae870b8592e/Cloudflare-DDoS-Protection---system-overview.png" />
            
            </figure><p>Diagram of Cloudflare’s DDoS protection systems</p><p>We’ve also added new DNS-centric data points to help customers better understand their DNS traffic patterns and attacks. These new data points are available in a new “DNS Protection” tab within the <a href="https://developers.cloudflare.com/analytics/network-analytics/">Cloudflare Network Analytics dashboard</a>. The new tab provides insights about which DNS queries are passed and dropped, as well as the characteristics of those queries, including the queried domain name and the record type. The analytics can also be fetched by using the <a href="https://developers.cloudflare.com/analytics/graphql-api/">Cloudflare GraphQL API</a> and by exporting logs into your own monitoring dashboards via <a href="https://developers.cloudflare.com/logs/reference/log-fields/account/network_analytics_logs/">Logpush</a>.</p>
    <div>
      <h2>DNS queries: discerning good from bad</h2>
      <a href="#dns-queries-discerning-good-from-bad">
        
      </a>
    </div>
    <p>To protect against sophisticated and highly randomized DNS-based DDoS attacks, we needed to get better at deciding which DNS queries are likely to be legitimate for our customers. However, it’s not easy to infer what’s legitimate and what’s likely to be a part of an attack just based on the query name. We can’t rely solely on fingerprint-based detection mechanisms, since sometimes seemingly random queries, like abc123.example.com, can be legitimate. The opposite is true as well: a query for mailserver.example.com might look legitimate, but can end up not being a real subdomain for a customer.</p><p>To make matters worse, our Layer 3 packet routing-based mitigation service, <a href="https://developers.cloudflare.com/magic-transit/">Magic Transit</a>, uses direct server return (DSR), meaning we can not see the DNS origin server’s responses to give us feedback about which queries are ultimately legitimate.</p>
            <figure>
            
            <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/5vjGjv8o2n6LJbU1dEmuqd/3333e3811d9af05d7705cd3e286edfaf/pasted-image-0--3-.png" />
            
            </figure><p>Diagram of Magic Transit with Direct Server Return (DSR)</p><p>We decided that the best way to combat these attacks is to build a data model of each customer’s expected DNS queries, based on a historical record that we build. With this model in hand, we can decide with higher confidence which queries are likely to be legitimate, and drop the ones that we think are not, shielding our customer’s DNS servers.</p><p>This is the basis of Advanced DNS Protection. It inspects every DNS query sent to our Magic Transit customers, and passes or drops them based on the data model and each customer’s individual settings.</p><p>To do so, each server at our global network continually sends certain DNS-related data such as query type (for example, A record) and the queried domains (but not the source of the query) to our core data centers, where we periodically compute DNS query traffic profiles for each customer. Those profiles are distributed across our global network, where they are consulted to help us more confidently and accurately decide which queries are good and which are bad. We drop the bad queries and pass on the good ones, taking into account a customer's tolerance for unexpected DNS queries based on their configurations.</p>
    <div>
      <h2>Solving the technical challenges that emerged when designing the Advanced DNS Protection system</h2>
      <a href="#solving-the-technical-challenges-that-emerged-when-designing-the-advanced-dns-protection-system">
        
      </a>
    </div>
    <p>In building this system, we faced several specific technical challenges:</p>
    <div>
      <h3>Data processing</h3>
      <a href="#data-processing">
        
      </a>
    </div>
    <p>We process tens of millions of DNS queries per day across our global network for our Magic Transit customers, not counting Cloudflare’s suite of other DNS products, and use the DNS-related data mentioned above to build custom query traffic profiles. Analyzing this type of data requires careful treatment of our data pipelines. When building these traffic profiles, we use sample-on-write and adaptive bitrate technologies when writing and reading the necessary data, respectively, to ensure that we capture the data with a fine granularity while protecting our data infrastructure, and we drop information that might impact the privacy of end users.</p>
    <div>
      <h3>Compact representation of query data</h3>
      <a href="#compact-representation-of-query-data">
        
      </a>
    </div>
    <p>Some of our customers see tens of millions of DNS queries per day alone. This amount of data would be prohibitively expensive to store and distribute in an uncompressed format. To solve this challenge, we decided to use a <a href="https://en.wikipedia.org/wiki/Counting_Bloom_filter"><i>counting Bloom filter</i></a> for each customer’s traffic profile. This is a probabilistic data structure that allows us to succinctly store and distribute each customer’s DNS profile, and then efficiently query it at packet processing time.</p>
    <div>
      <h3>Data distribution</h3>
      <a href="#data-distribution">
        
      </a>
    </div>
    <p>We periodically need to recompute and redistribute every customer’s DNS traffic profile between our data centers to each server in our fleet. We used our very own <a href="https://www.cloudflare.com/developer-platform/r2/">R2 storage service</a> to greatly simplify this task. With regional hints and custom domains enabled, we enabled caching and used only a handful of R2 buckets. Each time we need to update the global view of the customer data models across our edge fleet, 98% of the bits transferred are served from cache.</p>
    <div>
      <h3>Built-in tolerance</h3>
      <a href="#built-in-tolerance">
        
      </a>
    </div>
    <p>When new <a href="https://www.cloudflare.com/learning/dns/glossary/what-is-a-domain-name/">domain names</a> are put into service, our data models will not immediately be aware of them because queries with these names have never been seen before. This and other reasons for potential false positives mandate that we need to build a certain amount of tolerance into the system to allow through potentially legitimate queries. We do so by leveraging <a href="https://en.wikipedia.org/wiki/Token_bucket">token bucket algorithms</a>. Customers can configure the size of the token buckets by changing the sensitivity levels of the Advanced DNS Protection system. The lower the sensitivity, the larger the token bucket — and vice versa. A larger token bucket provides more tolerance for unexpected DNS queries and expected DNS queries that deviate from the profile. A high sensitivity level translates to a smaller token bucket and a stricter approach.</p>
    <div>
      <h2>Leveraging Cloudflare’s global software-defined network</h2>
      <a href="#leveraging-cloudflares-global-software-defined-network">
        
      </a>
    </div>
    <p>At the end of the day, these are the types of challenges that Cloudflare is excellent at solving. Our customers trust us with handling their traffic, and ensuring their Internet properties are protected, available and performant. We take that trust extremely seriously.</p><p>The Advanced DNS Protection system leverages our global infrastructure and data processing capabilities alongside intelligent algorithms and data structures to protect our customers.</p><p>If you are not yet a Cloudflare customer, <a href="https://www.cloudflare.com/lp/advanced-dns-protection/">let us know</a> if you’d like to protect your DNS servers. Existing Cloudflare customers can enable the new systems by contacting their account team or Cloudflare Support.</p> ]]></content:encoded>
            <category><![CDATA[Security Week]]></category>
            <category><![CDATA[DNS]]></category>
            <category><![CDATA[Advanced DDoS]]></category>
            <category><![CDATA[Network Protection]]></category>
            <guid isPermaLink="false">5DVU39aBbXaRqqZUSSgy7q</guid>
            <dc:creator>Omer Yoachimik</dc:creator>
            <dc:creator>Cody Doucette</dc:creator>
        </item>
    </channel>
</rss>