07/17/2025 | Press release | Distributed by Public on 07/17/2025 10:39
Web DDoS attacks have evolved into high-rate, Layer 7 floods generating tens of millions of legitimate-looking HTTP requests per second aiming to exhaust application resources and degrade its availability. These attacks are particularly challenging because they mimic normal user applicative behavior, making them extremely difficult to detect and mitigate using traditional methods.
Radware addresses this evolving threat with a layered mitigation strategy that combines:
This approach enables precise attack detection and mitigation at the application layer genuinely combined with efficient enforcement at the OS level. It delivers high scalability without introducing any operational overhead, all L3 to L7 mitigation activities are done automatically without any need for SOC/NOC teams' involvement. This combined mitigation approach keeps the "Time To Mitigate" performance at the level of less than 10 seconds.
Unlike classic DDoS attacks that flood bandwidth or target transport protocols, Web DDoS floods use large volumes of seemingly valid HTTP requests to exhaust resources like CPU, memory, backend database capacity, and others.
Our Web DDoS mitigation engine analyzes incoming traffic Layer 7 patterns across multiple dimensions to accurately identify and classify malicious traffic. This multi-faceted approach ensures that we can detect and mitigate even the most sophisticated WEB DDoS attacks.
Accurate Web DDoS attack detection and mitigation require analyzing traffic at Layer 7. Attackers increasingly use a variety of Web DDoS tools designed to generate ultra-high RPS attack traffic while evading mitigation systems. These tools employ extensive randomization across Layer 7 dimensions, including cookies and query arguments, making attack traffic appear legitimate. A single tool can generate millions of distinct transactions.
In some cases, multiple hacker groups coordinate attacks across multiple botnets, each using different tools. The result is a sophisticated, large-scale attack that challenges conventional mitigation systems globally. Any attempt at manual, human-based mitigation against these attacks inevitably fails.
Radware's Web DDoS solution performs intensive, multi-dimensional Layer 7 traffic analysis across a wide range of L7 attributes. We strongly advocate that only this comprehensive, multi-aspect approach can deliver the accuracy required for effective Web DDoS detection and mitigation.
Radware's solution establishes rigorous Layer 7 traffic baselines to:
These baselines enable the system to dynamically generate real-time Layer 7 signatures that precisely mitigate attacks as they evolve. Because attackers frequently change tactics, Radware's dynamic signature system continuously adapts in real time, ensuring effective mitigation even against attempts to evade detection. This comprehensive baselining and dynamic signature generation delivers "zero-minute" and often "zero-second" mitigation, making it an industry-leading solution.
While this would be an ideal place to showcase real-life attack examples and the L7 signatures generated, we have chosen not to provide advanced insights that could aid adversaries in bypassing our defenses.
During an active attack, real-time Layer 7 signatures are generated centrally in Radware's cloud services and are propagated globally to our Points of Presence (PoPs) within seconds. At each PoP, Radware's proxy enforces Layer 7 mitigation with high precision.
However, while L7 mitigation is highly accurate, it inherently carries operational costs due to its complexity. To address this, Radware has introduced combined mitigation capabilities: leveraging precise L7 intelligence to drive efficient Layer 3 enforcement using eBPF on our proxies in the PoP.
This "best of both worlds" approach leverages precise Layer 7 attacker profiling to enable efficient Layer 3 enforcement. Radware's system utilizes common attributes across Layers 3 to 7 for enforcement, including:
Using these dimensions, Radware's Web DDoS system dynamically identifies and validates attacker sources at Layer 7, then blocks malicious traffic efficiently at Layer 3. This ensures legitimate client traffic remains unaffected. GEO-based blocking is further refined using peacetime traffic baselines, minimizing the risk of collateral impact during active mitigation.
Additionally, identifying and enforcing attacker TLS fingerprints enables precise packet-level blocking, enhancing mitigation efficiency without compromising legitimate user experience.
Once a volumetric Web DDoS signature is confirmed, the next step is to block malicious traffic efficiently and cost-effectively at massive scale, without degrading performance for legitimate users. This is where our use of eBPF technology comes into play.
Radware compiles a list of abusive sources in real time based on:
These indicators allow precise targeting of malicious actors while preserving legitimate traffic.
Radware's proprietary algorithms perform this classification within seconds, requiring no manual tuning and achieving fast, reliable mitigation while preserving service continuity for real users.
This curated list is enforced inside the proxy's Linux kernel using eBPF (extended Berkeley Packet Filter) technology. This approach offers:
Benefits of In-Proxy Kernel Enforcement:
This architecture allows us to handle millions of malicious requests per second with precision and efficiency where it matters most.
To give technically inclined readers a clearer view, here's how Radware uses eBPF and XDP in our PoP proxies to enforce high-scale Web DDoS mitigation with minimal overhead.
L7 Detection Generates Accurate Source Intelligence
Radware's L7 analysis identifies malicious actors based on:
This intelligence is used to dynamically generate block signatures, which are pushed in real-time to PoP proxies.
Dynamic Block Maps in Kernel Space
Inside the proxy, Radware's eBPF programs use BPF maps to maintain:
These maps are updated in real time by Golang user-space control planes, ensuring dynamic adaptation to attacker pattern changes.
At the NIC level, Radware's XDP eBPF program efficiently enforces filtering by:
By using eBPF on the proxy itself, we bring the enforcement:
This architecture aligns with the needs of modern cloud-native infrastructure, offering speed, resilience, and distributed scalability.
Defending against volumetric Web DDoS attacks requires more than anomaly detection. It demands real-time enforcement exactly where the traffic enters your infrastructure.
Radware's Cloud WAAP and Web DDoS protection platform combines:
Together, these technologies deliver precise, efficient, and scalable mitigation. Even during extreme floods, legitimate users remain unaffected and applications stay responsive.