AWS, Cloudflare, and Google collaborate to mitigate record-breaking DDoS attacks using HTTP/2 Rapid Reset technique

In a significant show of collaboration, Amazon Web Services (AWS), Cloudflare, and Google have joined forces to combat a series of unprecedented distributed denial-of-service (DDoS) attacks. These attacks, which were detected in late August 2023, relied on a novel technique known as HTTP/2 Rapid Reset. In this article, we delve into the details of these attacks, their impact on each company’s infrastructure, the HTTP/2 Rapid Reset technique, the response and mitigation measures taken, and the concerns and future implications raised by these attacks.

Explanation of the HTTP/2 Rapid Reset technique

The HTTP/2 Rapid Reset technique refers to a zero-day flaw in the HTTP/2 protocol that threat actors exploit to carry out DDoS attacks. By leveraging this flaw, attackers are able to send and cancel requests in quick succession, overwhelming the server without reaching its configured threshold. This ability to reset streams immediately allows for an indefinite number of requests in flight on each connection, effectively taking down the targeted website.

Details of the DDoS attacks

The impact of these DDoS attacks varied across the three companies. While the attacks on Google’s cloud infrastructure peaked at an alarming 398 million requests per second (RPS), the attacks on AWS and Cloudflare reached volumes of 155 million and 201 million RPS, respectively. Such high volumes of requests placed immense strain on the targeted websites and their server infrastructure.

Response and mitigation measures

Facing this unprecedented threat, AWS, Cloudflare, and Google swiftly took coordinated action to mitigate the DDoS attacks. By working together, these companies were able to develop strategies to effectively counter the HTTP/2 Rapid Reset technique. Additionally, F5 issued an advisory to its NGINX customers, recommending that they update their configurations to limit the number of concurrent streams and persist HTTP connections for a set number of requests.

Concerns and future implications

The successful mitigation of these record-breaking DDoS attacks raises significant concerns and indicates future implications in the security landscape. Following the disclosure of the HTTP/2 vulnerability, threat actors are now more likely to exploit it, intensifying the race between defenders and attackers. Timely patching and robust mitigation strategies are crucial to stay ahead of potential attacks.

The ongoing race between defenders and attackers

With the HTTP/2 vulnerability widely known, it is only a matter of time before threat actors start exploiting it. This intensifies the urgency for defenders to patch their systems promptly and implement proactive measures to mitigate any potential attacks. The race between defenders and attackers will shape the future of web security, highlighting the critical importance of cybersecurity in the modern digital landscape.

The collaboration among AWS, Cloudflare, and Google to address the record-breaking DDoS attacks involving the HTTP/2 Rapid Reset technique serves as a testament to the severity of this threat. These attacks highlighted the vulnerability of websites and servers to this novel technique and emphasized the need for robust security measures. Proactive efforts, prompt patching, and ongoing collaboration between stakeholders will be essential in combating such advanced threats and safeguarding the digital infrastructure.

Explore more

A Unified Framework for SRE, DevSecOps, and Compliance

The relentless demand for continuous innovation forces modern SaaS companies into a high-stakes balancing act, where a single misconfigured container or a vulnerable dependency can instantly transform a competitive advantage into a catastrophic system failure or a public breach of trust. This reality underscores a critical shift in software development: the old model of treating speed, security, and stability as

AI Security Requires a New Authorization Model

Today we’re joined by Dominic Jainy, an IT professional whose work at the intersection of artificial intelligence and blockchain is shedding new light on one of the most pressing challenges in modern software development: security. As enterprises rush to adopt AI, Dominic has been a leading voice in navigating the complex authorization and access control issues that arise when autonomous

Canadian Employers Face New Payroll Tax Challenges

The quiet hum of the payroll department, once a symbol of predictable administrative routine, has transformed into the strategic command center for navigating an increasingly turbulent regulatory landscape across Canada. Far from a simple function of processing paychecks, modern payroll management now demands a level of vigilance and strategic foresight previously reserved for the boardroom. For employers, the stakes have

How to Perform a Factory Reset on Windows 11

Every digital workstation eventually reaches a crossroads in its lifecycle, where persistent errors or a change in ownership demands a return to its pristine, original state. This process, known as a factory reset, serves as a definitive solution for restoring a Windows 11 personal computer to its initial configuration. It systematically removes all user-installed applications, personal data, and custom settings,

What Will Power the New Samsung Galaxy S26?

As the smartphone industry prepares for its next major evolution, the heart of the conversation inevitably turns to the silicon engine that will drive the next generation of mobile experiences. With Samsung’s Galaxy Unpacked event set for the fourth week of February in San Francisco, the spotlight is intensely focused on the forthcoming Galaxy S26 series and the chipset that