Now, for those unaware, DDoS attacks usually force a website or a service to shut down by directing a flood of traffic to a web host that cannot handle it. These are generally performed using a botnet, which is a network of malware-compromised machines being controlled remotely.
In this case, Microsoft’s Azure suffered the attack via short bursts of traffic peaks of 2.4Tbps, 0.55Tbps, and 1.7Tbps. The company recently shared a blog post to announce its achievement and explain the attack in detail.
As per Amir Dahan, a Senior Program Manager at Microsoft’s Azure Networking team,“the attack traffic originated from approximately 70,000 sources and from multiple countries in the Asia-Pacific region, such as Malaysia, Vietnam, Taiwan, Japan, and China, as well as from the United States.”
However, Azure’s DDoS protection platform that is built on distributed DDoS detection and mitigation pipelines can absorb tens of terabits of DDoS attacks. So, the service was able to remain online throughout the entire attack period.
You cancheck out Microsoft’s in-depth blog postto know more about the attack, how Azure was able to absorb it all, and how to protect your workloads from DDoS attacks.
A geek at heart, you’ll find me fidgeting with an iOS device or sitting in front of the laptop, scouring the internet to find interesting technological innovations. In my free time, you’d find me playing Valorant or listening to Pink Floyd.