A deep dive into AWS Best Practices for DDoS Resiliency,
- Focusing on Edge Location Mitigation techniques — Specifically BP1 and BP3 as outlined in the AWS DDoS Resiliency Best
Practices framework.
Intro:
- AWS edge infrastructure (CloudFront, Route 53, Global Accelerator, AWS Shield, WAF) mitigate DDoS at scale, and the architectural best practices behind BP1 and BP3.
Overview of
AWS DDoS Resiliency Framework
- AWS recommends a layered approach for DDoS protection, typically mapped into Best Practices (BPs) that address resilience from edge to origin.
- The Edge layer is the first line of defense.
- The Edge layer is designed to absorb and mitigate volumetric and application-layer attacks before they ever reach twtech VPC or application servers.
BP1 – Use
AWS Edge Services (CloudFront, Route 53, Global Accelerator)
Objective
- Reduce attack surface and leverage AWS’s globally
distributed edge network to absorb and
filter DDoS attacks close to the source.
Key Components
1. Amazon CloudFront
- Global CDN with >400 edge locations.
- Absorbs volumetric attacks (e.g., UDP floods, TCP SYN floods, HTTP floods).
- Automatic scaling
— CloudFront’s distributed architecture allows it to handle sudden
traffic spikes (malicious or
legitimate).
- Connection Termination: CloudFront terminates TCP and TLS sessions at the edge, isolating your origin from direct traffic.
- Caching and Origin Shield: Cached objects reduce origin load; Origin Shield adds an additional centralized caching layer to further limit direct origin requests.
- Geo and ACL Filtering: Integrate with AWS WAF to drop unwanted requests by geography, IP reputation, or query patterns.
2. Amazon Route 53
- Authoritative DNS service that uses a globally distributed, anycast network.
- Resistant to DNS-based DDoS (NXDOMAIN floods ...attack that overwhelms a Domain Name System (DNS) server with requests for invalid, non-existent domain names, amplification attacks)).
- Automatically scales to handle billions of queries per day.
- Provides alias records that integrate directly with CloudFront and other AWS resources, avoiding exposure of public IPs.
3. AWS Global Accelerator
- Provides static IP addresses that front twtech application endpoints (ALBs, EC2s, EKS services).
- Uses the AWS global network backbone for deterministic routing and health-based traffic shifting.
- Mitigates DDoS at the network and transport layers before it reaches twtech backend by terminating traffic at edge PoPs (Points of Presence) ... are strategiest that locate facilities to network's periphery , thus bringing content, compute, and connectivity closer to end-users.
How BP1
Mitigates DDoS
|
Attack Type |
Mitigation via BP1 |
|
Volumetric (UDP floods, TCP SYN floods) |
Distributed edge absorption and packet filtering at
CloudFront/Route 53 edge locations. |
|
Application Layer (HTTP floods) |
CloudFront + WAF rate-based rules limit malicious requests
before reaching origin. |
|
DNS-based attacks |
Route 53’s anycast network absorbs query floods,
auto-scales response infrastructure. |
|
Protocol exploitation (SYN/ACK reflection) |
Edge TCP termination and Shield Standard’s SYN proxying
block malformed traffic. |
Core Principle
- Keep attack traffic away from your origin. The more of the application logic is pushed to the AWS edge, the less exposed twtech backend becomes.
BP3 –
Protect with AWS Shield and WAF
Objective
- Leverage AWS Shield and AWS WAF
to provide adaptive, automatic, and application-aware
DDoS protection.
Key Components
1. AWS Shield Standard
- Always-on, no-cost protection included with CloudFront,
Route 53, and Global Accelerator.
- Detects and automatically mitigates common
network/transport-layer DDoS attacks.
- Uses flow-based
detection and anomaly
analysis from global traffic patterns.
- Transparent mitigation — no customer configuration required.
2. AWS Shield Advanced
- Adds enhanced DDoS detection, 24/7 DDoS Response Team (DRT) support, and cost protection against scaling-related expenses.
- Provides near real-time metrics, health-based detection,
and per-resource anomaly baselining.
- Protects additional resources such as ALBs, NLBs, EC2, EKS beyond edge services.
3. AWS WAF (Web Application Firewall)
- Deployed at CloudFront, ALB, or API Gateway edge
endpoints.
- Filters malicious HTTP requests based on custom or
managed rule sets.
- Rate-based and anomaly rules throttle floods or bots that
slip past volumetric defenses.
- AWS Managed Rules (e.g., AWS Common Rule Set, Known Bad Inputs) cover OWASP Top 10 attacks.
How BP3
Mitigates DDoS
|
Attack Type |
Mitigation via BP3 |
|
Application-layer floods (HTTP POST/GET) |
WAF rate limiting and behavioral analysis block repeated
bad actors. |
|
Slowloris / connection exhaustion |
Shield Advanced uses early termination and connection
tracking heuristics. |
|
Bad bot traffic |
WAF Bot Control and AWS Managed Rules stop scraper/flood
behavior. |
|
Multi-vector attacks |
Shield coordinates multi-layer mitigation across
CloudFront, Route 53, and origin services. |
Core
Principle
NB:
Combine automatic network-layer
mitigation (Shield) with granular
application-layer inspection (WAF) to ensure end-to-end resilience.
Architecture: Edge-to-Origin Flow (BP1 + BP3
Together)
1.
Traffic enters AWS edge network → Anycast routes it to nearest edge POP.
2.
Shield Standard engages immediately for volumetric filtering.
3.
CloudFront terminates connections and caches static content.
4.
WAF evaluates requests (rules, IP
reputation, rate-limits).
5.
Legitimate traffic proceeds via AWS
backbone → ALB/NLB → EC2/EKS.
6.
Shield Advanced
protects backend layers if enabled.
7.
Distributed Routing Table (DRT
monitoring) and
health metrics detect ongoing or evolving threats.
Implementation
Best Practices.
- Always front public applications with CloudFront or Global Accelerator.
- Use Shield Advanced for mission-critical workloads (SLA-backed protection).
- Integrate WAF at the edge with rate-based and managed rules.
- Avoid exposing origin IPs — restrict inbound traffic to CloudFront or Global Accelerator IP ranges.
- Enable logging (CloudFront, WAF, Shield) for forensic visibility.
- Test with AWS’s DDoS Simulation Service (via Shield Advanced) to validate defenses.
Summary
|
Layer |
Service |
Role in DDoS Mitigation |
Best Practice |
|
Edge |
CloudFront / Route 53 / Global Accelerator. |
Absorb and isolate traffic close to users. |
BP1 |
|
Edge + Application |
Shield Standard / Advanced + WAF. |
Detect and block network + application attacks. |
BP3 |
|
Origin |
ALB / EC2 / EKS. |
Protected only from legitimate filtered traffic. |
BP1 + BP3 in effect |
Insights:
AWS DDoS resiliency: BP1
- In the context of protecting against
Distributed Denial of Service (DDoS)
attacks, AWS defines several best practices.
BP1: Has two related applications Practices:
· A, Web application delivery at the edge:
- AWS recommends using its edge locations to place the web application delivery as close as possible to the end users.
- This minimizes latency and reduces the distance malicious traffic has to travel.
· B, Protecting the origin:
- AWS suggests protecting your main origin server from direct internet access.
- By ensuring all web traffic passes through an AWS edge service like CloudFront or Global Accelerator, twtech can inspect and filter requests before they reach its origin.
BP1: W3C Data on the Web Best Practices.
- The World Wide Web Consortium (W3C) also has a set of best practices for publishing data on the web. In this context, BP1 is a general guideline for providing metadata.
· Provide metadata for both human users and computer applications:
- This means that when twtech publishes data, it should not only describe it in a way that people can understand but also provide machine-readable metadata.
- This allows automated applications to more easily find, process, and understand the data
AWS DDoS resiliency in :
- Amazon Web Services (AWS) also uses the abbreviation BP3 in its best practices for mitigating DDoS attacks, as it relates to DNS availability at the edge of the network.
· What BP3 is:
- In this context, BP3 is a best practice that involves using a DNS service like Amazon Route 53 to protect against denial-of-service attacks at the domain name resolution level.
· Purpose:
- This practice is part of a larger infrastructure-layer defense strategy to ensure the availability of web applications even when under attack
No comments:
Post a Comment