HTTP DDoS Attack Protection managed ruleset
The CIS HTTP DDoS Attack Protection managed ruleset is a set of pre-configured rules that are designed to detect and mitigate known Layer 7 (application-layer) DDoS attack vectors across the CIS global network.
Currently, the HTTP DDoS Attack Protection ruleset is only available using the CIS API.
The managed ruleset helps protect against:
- Known DDoS attack patterns and tools
- Suspicious request behavior
- Protocol violations
- Requests that generate excessive origin errors
- Traffic floods targeting the origin or cache
- Other application-layer attack vectors
The HTTP DDoS Attack Protection managed ruleset is always enabled for all CIS customers and cannot be disabled. However, you can customize how the ruleset responds to detected attacks.
The ruleset also provides visibility into Layer 7 DDoS attacks mitigated by CIS, allowing you to review both active and historical attack activity.
Ruleset configuration
If you expect large volumes of legitimate traffic, you can customize the HTTP DDoS Attack Protection settings to reduce false positives, where legitimate requests are incorrectly detected as attack traffic and blocked or challenged.
You can adjust the behavior of the rules in the managed ruleset by modifying the following parameters:
- The performed action when an attack is detected.
- The sensitivity level of attack detection mechanisms.
Certain actions and sensitivity levels are available only on specific CIS plans.
Currently, you can define account-level overrides for the HTTP DDoS Attack Protection managed ruleset only through the API.
To adjust the rule behavior, use ruleset APIs with the ddos_l7 phase.
Availability
The HTTP DDoS Attack Protection managed ruleset protects CIS customers on all plans and applies to all zones. Customers can configure the ruleset at both the zone level and the account level.
Customers on Enterprise plans can create up to 10 overrides (or up to 10 rules when using the API) with custom expressions to tailor DDoS protection for different categories of incoming requests.
Customers on Standard plans can create one override only and cannot customize the rule expression. In this case, the single override (containing one or more configuration settings) applies to all incoming requests.
Parameters
Configure the HTTP DDoS Attack Protection managed ruleset to change the action that is applied to a given attack or modify the sensitivity level of the detection mechanism.
You can define overrides using the Rulesets API.
The following parameters are available in the HTTP DDoS Attack Protection managed ruleset:
- Action
- Sensitivity level
Action
API property name: action.
The action determines how CIS handles HTTP requests that match rules in the HTTP DDoS Attack Protection managed ruleset.
| Action | API value | Description |
|---|---|---|
| Block | block |
Blocks HTTP requests that match the rule expression. |
| Managed Challenge | managed_challenge |
|
| Interactive Challenge | challenge |
Presents an interactive challenge to clients making HTTP requests that match the rule expression. |
| Log | log |
Available only on Enterprise plans with Advanced DDoS Protection. Logs requests that match the expression of a rule detecting HTTP DDoS attacks. Recommended for validating a rule before committing to a more severe action. |
| Connection Close | Not applicable (Internal rule action that you cannot use in overrides) | Instructs the client to establish a new connection by disabling keep-alive, instead of reusing the existing connection. Existing requests are not affected. |
| Force Connection Close | Not applicable (Internal rule action that you cannot use in overrides). |
|
| DDoS Dynamic | Not applicable (Internal rule action that you cannot use in overrides). | Performs a specific action according to a set of internal guidelines defined by CIS. The executed action may be one of the listed actions or another undisclosed mitigation. |
Sensitivity level
API property name: sensitivity_level.
The sensitivity level defines how aggressively the rule detects attacks by adjusting the mitigation thresholds:
- Higher sensitivity uses lower thresholds and detects attacks more aggressively.
- Lower sensitivity uses higher thresholds and is less aggressive.
The available sensitivity levels are:
| UI value | API value |
|---|---|
| High | default |
| Medium | medium |
| Low | low |
| Essentially Off | eoff |
The default sensitivity level is High.
When you select Essentially Off, the rule typically does not trigger mitigation actions, including Log. However, if an attack reaches an exceptional scale, CIS protection systems will still apply mitigation to protect the CIS network.
Selecting Essentially Off sets an extremely low sensitivity level. In most cases, traffic is not mitigated, but exceptionally large attacks are still mitigated to maintain network stability.
Sensitivity controls whether traffic is detected as an attack. Action controls what happens when an attack is detected.
When you select Log, requests are logged and displayed in the dashboard without mitigation. As with Essentially Off, exceptionally large attacks are still mitigated to protect the CIS network.
Rule categories
The HTTP DDoS Attack Protection managed rules are grouped into the following categories (tags) based on the type of traffic and mitigation behavior.
| Name | Description |
|---|---|
botnets |
Rules that detect requests originating from known botnets. These rules have very high detection accuracy and a low risk of false positives. It is recommended that you keep these rules enabled. |
unusual-requests |
Rules that identify requests with suspicious characteristics that are not commonly observed in legitimate traffic. |
advanced |
Rules associated with features available to Enterprise customers. |
generic |
Rules that detect and mitigate floods of requests. These rules are effective against attacks without known signatures, but they may also trigger during unusually high volumes of legitimate traffic. To reduce the risk of false positives, these rules use a higher requests-per-second (rps) activation threshold. By default, these rules rate limit or challenge traffic, but you can override them to block traffic if required. |
read-only |
Highly targeted rules designed to mitigate DDoS attacks with a high confidence rate. These rules are read-only. You cannot override their sensitivity level or action. |
test |
Rules used to test the detection, mitigation, and alerting capabilities of CIS DDoS protection products. |