Skip to content

Security: WAAP (DDoS, WAF, Bot, API)

Modern security requires a layered defense strategy integrating DDoS mitigation, WAF, Bot Management, and API Security.

  • Volumetric Attacks (L3/L4): Flooding pipes with UDP/ICMP traffic (e.g., UDP Reflection). What is a DDoS Attack? (Cloudflare).
    • Defense: Anycast network absorption. Spreading traffic across global PoPs.
  • Application Attacks (L7): Flooding resources with HTTP requests (e.g., HTTP Flood).
    • Defense: Rate Limiting, Challenge/Response (JS Challenge).

Protects against application vulnerabilities. What is a WAF? (Cloudflare).

  • OWASP Top 10: Standard awareness document (Injection, Broken Auth, XSS, etc.). OWASP Top 10.
  • Rule Sets:
    • Managed Rules: Vendor-provided signatures (e.g., Cloudflare Managed Ruleset).
    • Custom Rules: Logic based on Headers, IP, ASN, etc.
  • Positive Security Model: Deny all, allow only known good traffic (Strict Schema Validation).

Distinguishing between Humans, Good Bots (Googlebot), and Bad Bots (Scrapers, Credential Stuffing). What is Bot Management? (Cloudflare).

  • Fingerprinting: Analyzing TLS Handshake (JA3), HTTP Headers, and Browser behavior (Canvas fingerprinting).
  • Behavioral Analysis: Detecting non-human patterns (mouse movement, request velocity).
  • Actions: Allow, Block, Log, Challenge (Turnstile/CAPTCHA).

APIs are the primary attack vector for modern apps. OWASP API Security Top 10.

  • Schema Validation: Enforcing strict OpenAPI/Swagger definitions. Rejecting malformed JSON.
  • Authentication:
    • mTLS: Mutual authentication for service-to-service.
    • OIDC/OAuth2: Standard delegation protocols.
  • Shadow APIs: Undocumented endpoints exposed to the public. Discovery tools are essential.