与4月份的攻击类似,这次的攻击主要来自云服务提供商,而不是住宅互联网服务提供商。这意味着数据中心里的虚拟机和服务器被劫持来实施攻击,而不是此前惯用的物联网(IoT)设备。
进行这次攻击的僵尸网络由5067台设备组成,在攻击的高峰期,每个节点每秒发出5200个请求。
Cloudflare指出,这次攻击是通过HTTPS进行的,这意味着不仅要花费更多的钱来发动攻击,要设法应对攻击也是如此。该僵尸网络的攻击来自121个国家,其中印度尼西亚、美国、巴西和俄罗斯的请求最多,来自他们国家,甚至有3%的攻击也是通过Tor连接进行的。
Cloudflare表示,其免费和专业CDN套餐的所有客户都受到保护以免受类似的攻击而导致停机事故,不仅如此,这种的保护是不计费和无限制的,所以无论攻击的规模或持续时间有多大多长,客户都不会被收取更多的服务费。
Similar to the attack in April, the attack mainly came from cloud service providers rather than residential Internet service providers. This means that virtual machines and servers in the data center are hijacked to carry out attacks, rather than the previously used Internet of things (IoT) devices.
The botnet that carried out the attack was made up of 5067 devices, and at the peak of the attack, each node sent 5200 requests per second.
Cloudflare pointed out that the attack was carried out through HTTPS, which means not only spending more money to launch the attack, but also trying to deal with the attack. The botnet attacks came from 121 countries, with Indonesia, the United States, Brazil and Russia receiving the most requests from their countries, and even 3 per cent of the attacks were carried out through Tor connections.
Cloudflare said that all customers of its free and professional CDN packages are protected from downtime caused by similar attacks, and not only that, such protection is free and unlimited, so customers will not be charged more for services regardless of the size or duration of the attack.