filter >

Photo

How to make your network application vulnerable to DDoS attacks in CDN era

Ivan Koveshnikov

from Gcore (Luxembourg)

About speaker

Computer networking enthusiast. Fell in love with computer networks at university, worked on software for managed switches and software routers, bootloaders, Linux kernel networking, HTTP servers and eBPF DDoS protection systems.

About speakers company

Gcore accelerates AI training, provides comprehensive cloud services, improves content delivery, and protects servers and applications.

Abstracts

specific

The beginning of CDN era has changed the landscape of HTTP applications. Although the necessity of exposing a part of the traffic to middleware companies erupted in severe discussions in social networks, their ability to provide wide networking channels and serve many more users was unquestionable. Spreading across the globe, CDN networks have changed the design of network applications, forcing developers to care about proxying and caching layers between the backend server and the client endpoints.

But this continental drift hasn't affected the landscape of other networking applications. Many networking applications are not ready for DDoS attacks, and the possibilities to offload the protection for some of them are minimal, resulting in either covering only a couple of attack vectors or very basic filtering from random floods.

In this talk, I will focus on topics that allow offloading L7 DDoS protection for your networking applications or games, taking advantage of the almost unlimited bandwidth of IaaS companies, and leveraging their infrastructure to cover most of the risks. I will show how the evolution of applications and the choices made in the beginning resulted in the current state of some applications or games you may know. I will give some advice on how to effectively ruin an application's ability to withstand L7 DDoS attacks.

The talk was declined