<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloud Security on Barash Helvadzhaoglu</title><link>https://barashhelvadzhaoglu.com/en/tags/cloud-security/</link><description>Recent content in Cloud Security on Barash Helvadzhaoglu</description><generator>Hugo -- 0.160.1</generator><language>en</language><lastBuildDate>Mon, 30 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://barashhelvadzhaoglu.com/en/tags/cloud-security/index.xml" rel="self" type="application/rss+xml"/><item><title>DDoS Protection Strategies: ISP Scrubbing, On-Premise Appliances, and Cloud Services</title><link>https://barashhelvadzhaoglu.com/en/technology/ddos-protection-strategies/</link><pubDate>Mon, 30 Mar 2026 00:00:00 +0000</pubDate><guid>https://barashhelvadzhaoglu.com/en/technology/ddos-protection-strategies/</guid><description>DDoS protection guide — attack types, ISP scrubbing, on-premise appliances, cloud services, and how to choose the right combination for your organization.</description><content:encoded><![CDATA[<h1 id="ddos-protection-strategies-isp-scrubbing-on-premise-appliances-and-cloud-services">DDoS Protection Strategies: ISP Scrubbing, On-Premise Appliances, and Cloud Services</h1>
<p>A DDoS (Distributed Denial of Service) attack doesn&rsquo;t need to compromise your systems. It just needs to make them unreachable. And unlike most security threats, the damage is instant and fully visible — your application stops working, customers can&rsquo;t reach you, and revenue stops.</p>
<p>What makes DDoS uniquely difficult is that the attack traffic looks legitimate at the packet level. Millions of valid TCP SYN packets, millions of valid DNS queries, millions of valid HTTP requests — all perfectly formed, all completely intentional. Your network processes them the same way it processes real traffic, and that&rsquo;s exactly the problem.</p>
<p>After working in banking infrastructure where DDoS protection was a regulatory requirement — not just a best practice — I want to walk through how organizations actually protect themselves: what the three main approaches are, what each one can and cannot do, and how they combine in practice.</p>
<hr>
<h2 id="understanding-the-attack-surface">Understanding the Attack Surface</h2>
<p>Before choosing a protection strategy, it&rsquo;s worth being precise about what you&rsquo;re protecting against. DDoS attacks fall into three categories, and they require fundamentally different mitigation approaches.</p>
<h3 id="volumetric-attacks-layer-34">Volumetric Attacks (Layer 3/4)</h3>
<p>The most visible type. The goal is simple: saturate your internet link with more traffic than it can carry.</p>
<p>Common techniques:</p>
<ul>
<li><strong>UDP flood</strong> — send massive volumes of UDP packets to random ports. The target sends ICMP &ldquo;port unreachable&rdquo; responses, consuming both inbound and outbound bandwidth.</li>
<li><strong>ICMP flood (Ping flood)</strong> — overwhelm with ping requests.</li>
<li><strong>Amplification attacks</strong> — the most dangerous variant. Attacker sends small requests to misconfigured third-party servers (DNS resolvers, NTP servers, memcached instances) using your IP as the source. Those servers send large responses to you. DNS amplification can achieve 50–70× amplification; memcached amplification has reached 51,000×.</li>
</ul>
<p><strong>Scale:</strong> Modern volumetric attacks routinely exceed 1 Tbps. A 10 Gbps internet link is irrelevant against this — you&rsquo;re flooded before a single packet reaches your firewall.</p>
<p><strong>Key insight:</strong> You cannot mitigate volumetric attacks on your own premises if the attack volume exceeds your ISP uplink. The traffic must be filtered upstream — at the ISP or cloud level — before it reaches your connection.</p>
<h3 id="protocol-attacks-layer-34">Protocol Attacks (Layer 3/4)</h3>
<p>Exhaust network device resources rather than bandwidth.</p>
<ul>
<li><strong>SYN flood</strong> — send millions of TCP SYN packets without completing the handshake. The target allocates memory for each half-open connection until the connection table fills and legitimate connections are rejected.</li>
<li><strong>Fragmented packet attacks</strong> — send malformed or overlapping IP fragments that overwhelm reassembly buffers.</li>
<li><strong>Smurf attack</strong> — ICMP broadcast amplification using forged source IPs.</li>
</ul>
<p><strong>Scale:</strong> Measured in packets per second (Mpps), not bandwidth. A 100 Mbps SYN flood at small packet sizes can exceed the connection table capacity of a mid-range firewall.</p>
<p><strong>Key insight:</strong> Protocol attacks can be mitigated on-premise by dedicated DDoS hardware with FPGA-based packet processing — but only if the volume doesn&rsquo;t saturate your upstream link first.</p>
<h3 id="application-layer-attacks-layer-7">Application Layer Attacks (Layer 7)</h3>
<p>The hardest to detect and mitigate. Traffic is legitimate HTTP/HTTPS — it&rsquo;s the intent that&rsquo;s malicious.</p>
<ul>
<li><strong>HTTP flood</strong> — millions of HTTP GET or POST requests targeting resource-intensive endpoints (search, login, report generation).</li>
<li><strong>Slowloris</strong> — open many connections and send HTTP headers very slowly, keeping connections open without completing requests. Exhausts the server&rsquo;s connection pool.</li>
<li><strong>RUDY (R-U-Dead-Yet)</strong> — similar to Slowloris but for POST bodies. Sends data one byte at a time.</li>
<li><strong>SSL exhaustion</strong> — initiate TLS handshakes but never complete them, or complete handshakes and immediately renegotiate. CPU-intensive for servers without hardware SSL acceleration.</li>
</ul>
<p><strong>Scale:</strong> Can be devastatingly effective at low traffic volumes — a few thousand requests per second targeting the right endpoint can bring down a web server that handles millions of normal requests.</p>
<p><strong>Key insight:</strong> Layer 7 attacks require application-aware mitigation. A volumetric scrubbing service cannot distinguish a malicious HTTP flood from legitimate traffic — it needs WAF or behavioral analysis capabilities.</p>
<hr>
<h2 id="the-three-protection-approaches">The Three Protection Approaches</h2>
<p>No single protection approach covers all attack types at all scales. Organizations with serious DDoS exposure typically combine two or three of these layers.</p>
<hr>
<h2 id="1-isp-based-scrubbing-services">1. ISP-Based Scrubbing Services</h2>
<h3 id="how-it-works">How It Works</h3>
<p>Your ISP (or a specialist scrubbing provider with upstream network agreements) diverts your traffic to a <strong>scrubbing center</strong> during an attack. In the scrubbing center, attack traffic is filtered and only clean traffic is forwarded to your network:</p>
<pre tabindex="0"><code>Normal operation:
  Internet → ISP → Your Network

During attack:
  Internet → ISP → Scrubbing Center → Clean traffic → Your Network
                        │
                   Attack traffic dropped
</code></pre><p>Traffic diversion is typically triggered in two ways:</p>
<ul>
<li><strong>On-demand:</strong> You contact the ISP when an attack is detected. Manual process, response time depends on the provider.</li>
<li><strong>Always-on:</strong> Traffic is continuously routed through scrubbing. No detection delay, but adds latency.</li>
</ul>
<h3 id="what-isp-scrubbing-protects-against">What ISP Scrubbing Protects Against</h3>
<p>ISP scrubbing is designed specifically for <strong>volumetric attacks</strong>. It operates at the network layer, upstream of your infrastructure. An attack that would saturate your 10 Gbps link is absorbed by the provider&rsquo;s 10 Tbps+ capacity before it reaches you.</p>
<p>Major scrubbing providers (Telia, Lumen, GTT, Zayo, and others) operate globally distributed scrubbing centers with aggregate capacities in the tens of Tbps.</p>
<h3 id="what-isp-scrubbing-does-not-do">What ISP Scrubbing Does Not Do</h3>
<ul>
<li><strong>Layer 7 protection:</strong> ISP scrubbing operates at L3/L4. It cannot analyze HTTP request content. A sophisticated application-layer attack using legitimate-looking HTTP traffic will pass through scrubbing untouched.</li>
<li><strong>Low-and-slow attacks:</strong> Slowloris, RUDY, and SSL exhaustion are not volumetric — they don&rsquo;t trigger volume-based scrubbing activation.</li>
<li><strong>Instant response:</strong> On-demand scrubbing has an activation delay — typically 15–30 minutes while traffic is diverted. During this window, the attack continues unmitigated.</li>
</ul>
<h3 id="when-isp-scrubbing-makes-sense">When ISP Scrubbing Makes Sense</h3>
<ul>
<li>Your primary threat is volumetric attacks (the most common type targeting infrastructure)</li>
<li>Your ISP link is 10 Gbps or less (almost any volumetric attack exceeds this)</li>
<li>You have regulatory requirements for DDoS protection but cannot justify hardware costs</li>
<li>You want a cost-effective baseline protection layer</li>
</ul>
<p><strong>Cost model:</strong> Typically a monthly retainer plus per-GB or per-event fees during active mitigation. Generally more cost-effective than on-premise hardware for pure volumetric protection.</p>
<hr>
<h2 id="2-on-premise-ddos-appliances">2. On-Premise DDoS Appliances</h2>
<h3 id="how-it-works-1">How It Works</h3>
<p>A dedicated hardware device (or virtual appliance) sits inline in your network, upstream of your firewall:</p>
<pre tabindex="0"><code>Internet → [ISP Router] → [DDoS Appliance] → [NGFW] → Internal Network
</code></pre><p>The appliance analyzes all traffic in real time and drops attack packets before they reach your firewall or servers. Unlike software-based solutions, purpose-built DDoS appliances use <strong>FPGA (Field Programmable Gate Array)</strong> hardware for packet processing — enabling line-rate analysis at 40–100 Gbps without impacting legitimate traffic.</p>
<h3 id="leading-on-premise-solutions">Leading On-Premise Solutions</h3>
<p><strong>NETSCOUT Arbor (Peakflow / Sightline / TMS)</strong>
The dominant enterprise solution, particularly in banking and telco. Arbor is widely considered the industry standard for on-premise DDoS protection. The platform combines:</p>
<ul>
<li><strong>Sightline:</strong> Traffic analysis and attack detection using flow data (NetFlow, sFlow, IPFIX) and BGP</li>
<li><strong>Threat Mitigation System (TMS):</strong> Hardware-based scrubbing appliance deployed inline or out-of-band</li>
<li>Integration with Arbor&rsquo;s global threat intelligence network (ATLAS)</li>
</ul>
<p><strong>Radware DefensePro</strong>
Strong in financial services. Features behavioral-based detection that creates a dynamic baseline of normal traffic and detects anomalies — effective against zero-day DDoS attacks that don&rsquo;t match known signatures.</p>
<p><strong>Fortinet FortiDDoS</strong>
Integrated with the Fortinet ecosystem. Suitable for organizations already running FortiGate firewalls who want consistent management.</p>
<p><strong>F5 BIG-IP AFM (Advanced Firewall Manager)</strong>
As discussed in the F5 series — AFM provides DDoS mitigation capabilities as part of the BIG-IP platform. Most suitable for environments already running F5 for application delivery, where adding DDoS protection to existing hardware is cost-effective.</p>
<h3 id="what-on-premise-appliances-protect-against">What On-Premise Appliances Protect Against</h3>
<ul>
<li><strong>Protocol attacks:</strong> SYN floods, fragmented packets, malformed headers — handled at hardware speed before reaching the firewall</li>
<li><strong>Application layer attacks:</strong> Advanced appliances with behavioral analysis can detect and mitigate HTTP floods, Slowloris, and SSL exhaustion</li>
<li><strong>Zero-day behavioral attacks:</strong> Rate-based and behavioral detection identifies attack patterns without requiring known signatures</li>
</ul>
<h3 id="what-on-premise-cannot-do">What On-Premise Cannot Do</h3>
<p><strong>Volumetric attacks that exceed your ISP link:</strong> An on-premise appliance at your data center cannot help when 500 Gbps of attack traffic is filling your 10 Gbps internet connection. The attack wins before a single packet reaches your appliance. This is the fundamental limitation.</p>
<p>This is why on-premise appliances and ISP scrubbing are <strong>complementary, not competing</strong> solutions.</p>
<h3 id="when-on-premise-makes-sense">When On-Premise Makes Sense</h3>
<ul>
<li>You need protection against protocol and application-layer attacks</li>
<li>You have regulatory requirements for on-premise traffic inspection</li>
<li>You&rsquo;re already running F5 or FortiGate and can leverage existing hardware</li>
<li>You need granular visibility into attack traffic for forensics and compliance reporting</li>
<li>Your internet link is large enough (100 Gbps+) that pure volumetric attacks are less of a risk</li>
</ul>
<hr>
<h2 id="3-cloud-ddos-protection-services">3. Cloud DDoS Protection Services</h2>
<h3 id="how-it-works-2">How It Works</h3>
<p>Cloud DDoS protection routes all your traffic through the provider&rsquo;s globally distributed network. Clean traffic is delivered to your origin servers; attack traffic is dropped at the edge:</p>
<pre tabindex="0"><code>Without cloud protection:
  User → Internet → Your Server

With cloud protection:
  User → [Cloudflare / Akamai / AWS edge] → Your Server
                    │
             Attack traffic dropped
             at the network edge
</code></pre><p>Traffic routing is typically achieved through:</p>
<ul>
<li><strong>DNS change:</strong> Point your domain&rsquo;s DNS to the cloud provider&rsquo;s anycast network</li>
<li><strong>BGP announcement:</strong> The provider announces your IP prefixes from their network</li>
</ul>
<h3 id="leading-cloud-solutions">Leading Cloud Solutions</h3>
<p><strong>Cloudflare</strong>
The most widely known cloud DDoS provider. Cloudflare operates one of the world&rsquo;s largest anycast networks — 300+ PoPs globally, with aggregate capacity exceeding 230 Tbps. Key capabilities:</p>
<ul>
<li>Automatic DDoS mitigation without manual intervention</li>
<li>Layer 3, 4, and 7 protection in a single platform</li>
<li>WAF integration — application security and DDoS mitigation from the same provider</li>
<li>Magic Transit for infrastructure-level protection (BGP-based, not just HTTP)</li>
<li>Unmetered DDoS mitigation — no per-GB charges during attacks</li>
</ul>
<p><strong>AWS Shield</strong></p>
<ul>
<li><strong>Shield Standard:</strong> Automatically included for all AWS resources. Protects against common L3/L4 attacks.</li>
<li><strong>Shield Advanced:</strong> Paid tier with L7 protection, 24/7 DDoS Response Team access, cost protection (AWS credits for scaling costs during attacks), and integration with AWS WAF.</li>
<li>Best suited for organizations with significant AWS infrastructure.</li>
</ul>
<p><strong>Akamai Prolexic</strong>
Enterprise-focused cloud scrubbing platform. Operates 20+ globally distributed scrubbing centers. Strong track record in financial services and media. Prolexic Routed provides always-on BGP-based protection for infrastructure (not just web applications).</p>
<p><strong>Azure DDoS Protection</strong>
Microsoft&rsquo;s offering for Azure-hosted resources. Standard tier provides adaptive tuning, attack telemetry, and rapid response support. Most relevant for organizations running significant workloads in Azure.</p>
<h3 id="what-cloud-protection-covers">What Cloud Protection Covers</h3>
<ul>
<li><strong>Volumetric attacks at any scale:</strong> Cloud providers have multi-Tbps capacity at globally distributed edge locations. An attack that overwhelms ISP scrubbing capacity is distributed across hundreds of PoPs.</li>
<li><strong>Application layer attacks:</strong> Providers like Cloudflare combine DDoS mitigation with WAF, bot management, and rate limiting at the edge.</li>
<li><strong>Always-on without configuration changes:</strong> Once traffic is routed through the provider, protection is continuous with no activation delay.</li>
</ul>
<h3 id="what-cloud-protection-adds">What Cloud Protection Adds</h3>
<ul>
<li><strong>Latency:</strong> All traffic passes through the provider&rsquo;s network. For most web applications, the latency added by edge PoPs is negligible or negative (edge caching actually reduces latency). For latency-sensitive applications (trading platforms, real-time communications), evaluate carefully.</li>
<li><strong>Privacy/compliance considerations:</strong> All traffic, including SSL-decrypted content, passes through the provider&rsquo;s infrastructure. In regulated industries (banking, healthcare), this requires careful review of the provider&rsquo;s data processing agreements.</li>
<li><strong>DNS dependency:</strong> DNS-based cloud protection can be bypassed if attackers discover your origin IP and attack it directly. Protect origin IPs carefully — restrict access at the firewall level to only the cloud provider&rsquo;s IP ranges.</li>
</ul>
<h3 id="when-cloud-protection-makes-sense">When Cloud Protection Makes Sense</h3>
<ul>
<li>Your application is internet-facing and must remain available during large-scale volumetric attacks</li>
<li>You want always-on protection without hardware investment</li>
<li>You&rsquo;re already using cloud infrastructure (AWS, Azure) and want integrated protection</li>
<li>You need global distribution to protect against geographically distributed attacks</li>
</ul>
<hr>
<h2 id="comparing-the-three-approaches">Comparing the Three Approaches</h2>
<table>
  <thead>
      <tr>
          <th></th>
          <th>ISP Scrubbing</th>
          <th>On-Premise Appliance</th>
          <th>Cloud Service</th>
      </tr>
  </thead>
  <tbody>
      <tr>
          <td>Volumetric protection</td>
          <td>✅</td>
          <td>❌ (limited by link)</td>
          <td>✅✅</td>
      </tr>
      <tr>
          <td>Protocol attack protection</td>
          <td>✅</td>
          <td>✅✅</td>
          <td>✅</td>
      </tr>
      <tr>
          <td>Application layer (L7)</td>
          <td>❌</td>
          <td>✅ (advanced models)</td>
          <td>✅✅</td>
      </tr>
      <tr>
          <td>Activation time</td>
          <td>Minutes (on-demand)</td>
          <td>Immediate</td>
          <td>Immediate</td>
      </tr>
      <tr>
          <td>Traffic visibility</td>
          <td>Limited</td>
          <td>Full</td>
          <td>Provider-dependent</td>
      </tr>
      <tr>
          <td>Compliance / data residency</td>
          <td>✅</td>
          <td>✅✅</td>
          <td>Requires review</td>
      </tr>
      <tr>
          <td>CapEx</td>
          <td>Low</td>
          <td>High</td>
          <td>None</td>
      </tr>
      <tr>
          <td>OpEx</td>
          <td>Medium</td>
          <td>Medium</td>
          <td>Medium–High</td>
      </tr>
      <tr>
          <td>Scalability</td>
          <td>ISP capacity</td>
          <td>Fixed hardware</td>
          <td>Near-unlimited</td>
      </tr>
  </tbody>
</table>
<hr>
<h2 id="the-hybrid-model-how-serious-organizations-combine-all-three">The Hybrid Model: How Serious Organizations Combine All Three</h2>
<p>In high-risk environments — banking, payment processors, government infrastructure, large e-commerce — a single protection layer is never sufficient. The standard architecture combines all three:</p>
<pre tabindex="0"><code>Attack traffic
      │
      ▼
[Cloud / ISP Scrubbing]      ← Absorbs volumetric floods before they reach you
      │
   Clean(er) traffic
      │
      ▼
[On-Premise Appliance]       ← Catches protocol attacks and L7 anomalies
      │
      ▼
[NGFW + WAF]                 ← Application security and policy enforcement
      │
      ▼
[Application Servers]
</code></pre><p><strong>Layer 1 — Cloud or ISP scrubbing:</strong> Absorbs volumetric attacks at scale. The upstream layer handles what on-premise hardware physically cannot.</p>
<p><strong>Layer 2 — On-premise appliance:</strong> Catches protocol attacks and application-layer anomalies that slipped through scrubbing. Provides detailed forensic visibility for compliance and incident response.</p>
<p><strong>Layer 3 — NGFW + WAF:</strong> Handles application security, policy enforcement, and the most sophisticated L7 attacks targeting specific application logic.</p>
<p>Each layer handles what the others cannot. The combination creates defense-in-depth that is resilient to the full spectrum of DDoS attack types.</p>
<h3 id="real-world-example-banking-sector">Real-World Example: Banking Sector</h3>
<p>In the banking environment I worked in, the DDoS protection stack was:</p>
<ul>
<li><strong>Arbor TMS</strong> on-premise — inline scrubbing for protocol attacks, real-time flow analysis for anomaly detection, integration with BGP for automated traffic diversion</li>
<li><strong>ISP scrubbing contract</strong> — activated when Arbor detected volumetric attack signatures that would saturate the uplink</li>
<li><strong>Cloudflare Magic Transit</strong> — for public-facing web applications, providing always-on cloud-level protection with WAF integration</li>
<li><strong>F5 AFM</strong> — additional L4 protection on the application delivery tier</li>
</ul>
<p>This wasn&rsquo;t redundancy for its own sake — each layer handled attack types the others couldn&rsquo;t.</p>
<hr>
<h2 id="ddos-response-planning-the-non-technical-part">DDoS Response Planning: The Non-Technical Part</h2>
<p>Technology is only part of DDoS readiness. The other part is organizational:</p>
<p><strong>Runbooks:</strong> Document exactly what to do when an attack starts. Who gets notified? Who activates ISP scrubbing? What&rsquo;s the escalation path? Under attack is the wrong time to figure this out.</p>
<p><strong>Contact lists:</strong> ISP scrubbing activation, cloud provider support, upstream router access, on-call network engineers. All current, all tested.</p>
<p><strong>Thresholds and automation:</strong> Define when automated mitigation activates vs. when human review is required. Fully manual responses are too slow for modern attack rates.</p>
<p><strong>Regular testing:</strong> A DDoS protection stack that has never been tested is a DDoS protection stack you don&rsquo;t actually trust. Schedule periodic tests with your ISP and cloud provider.</p>
<p><strong>Post-incident review:</strong> After every significant attack, review what worked, what didn&rsquo;t, and what the attack traffic looked like. DDoS tactics evolve — your protection strategy should too.</p>
<hr>
<h2 id="key-takeaways">Key Takeaways</h2>
<ul>
<li>DDoS attacks come in three fundamentally different types — volumetric, protocol, and application layer — and each requires different mitigation.</li>
<li><strong>No single protection layer covers all attack types.</strong> Volumetric attacks require upstream scrubbing capacity; protocol attacks need hardware-speed packet processing; L7 attacks require application-aware analysis.</li>
<li><strong>ISP scrubbing</strong> is the only option for very large volumetric attacks — the attack must be absorbed before it reaches your link.</li>
<li><strong>On-premise appliances</strong> (Arbor, Radware, F5 AFM) provide granular visibility, compliance-friendly on-site processing, and effective protocol/L7 protection — but cannot handle attacks that exceed your ISP link capacity.</li>
<li><strong>Cloud services</strong> (Cloudflare, AWS Shield, Akamai) offer massive scale, global distribution, and always-on protection with no hardware investment — but introduce traffic routing through third-party infrastructure.</li>
<li>In high-risk environments, all three layers work together. This isn&rsquo;t over-engineering — it&rsquo;s the architecture that serious organizations use in practice.</li>
</ul>
<hr>
<h2 id="related-articles">Related Articles</h2>
<ul>
<li>🛡️ <a href="/en/technology/f5-bigip-application-delivery-platform-overview/">F5 BIG-IP Platform Overview</a> — F5 AFM as part of DDoS defense in depth</li>
<li>🔐 <a href="/en/architecture/zero-trust-mindset-engineering-security-as-an-architecture-not-a-product/">The Zero Trust Mindset: Engineering Security as an Architecture</a> — DDoS protection within a Zero Trust framework</li>
<li>🛡️ <a href="/en/posts/network-packet-broker-masterclass/">Network Packet Broker (NPB) Masterclass</a> — Traffic visibility essential for DDoS forensics</li>
<li>📊 <a href="/en/architecture/monitoring-not-just-seeing/">Monitoring Done Right</a> — Detecting DDoS early through proactive monitoring</li>
</ul>
]]></content:encoded></item></channel></rss>