當網路攻擊越來越複雜,為何Anycast 網路æˆç‚ºä¿è·ä¼æ¥çš„首é¸ï¼Ÿ
在親俄é§å®¢ NoName057 å°å°ç£çš„攻擊ä¸ï¼ŒAnycast 網路架構展ç¾äº†é¡¯è‘—的優勢。Anycast 是一種讓單一 IP 地å€èƒ½ç”±å¤šå€‹æ•¸æ“šä¸å¿ƒåŒæ™‚響應的技術,它使攻擊æµé‡èƒ½å¤ 自動分散到全çƒå„地的數據ä¸å¿ƒï¼Œå¾žè€Œå¤§å¹…æ¸›å°‘å–®é»žç“¶é ¸çš„é¢¨éšªã€‚
ç¾æ³
å°ç£ç›®å‰ä½¿ç”¨çš„主è¦ç¶²è·¯å®‰å…¨èˆ‡åˆ†ä½ˆå¼é˜²ç¦¦æœå‹™ï¼ŒåŒ…括本地 ISP æ¥è€…ã€ä¸‰å¤§å…¬æœ‰é›²ã€å…¶ä»–雲地架構ç‰ï¼Œé›–然有類似的防禦功能,但它們ä¸å®Œå…¨åŸºæ–¼ Anycast 架構,而是採用了其他架構來分發æµé‡èˆ‡ç·©è§£æ”»æ“Šã€‚以下是å°ç£ä¼æ¥å¸¸è¦‹çš„架構å稱,包括:
1. Anycast 架構
基於網路層的全çƒåˆ†æ•£æŠ€è¡“。Anycast å…許åŒä¸€å€‹ IP 地å€å°æ‡‰åˆ°å¤šå€‹ä¼ºæœå™¨ï¼Œä¸¦ç”± BGP 路由自動將æµé‡åˆ†é…到最近或最佳的伺æœå™¨ã€‚當æµé‡æˆ–攻擊來臨時,全çƒç¶²è·¯æœƒè‡ªå‹•å°‡æµé‡åˆ†æ•£åˆ°ä¸åŒçš„節點,æ供天然的 DDoS 防è·å’Œè² 載å‡è¡¡ï¼Œç„¡éœ€é¡å¤–çš„ DNS è¨ç½®æˆ–應用層干é 。
2. ISP 資安供應商:Unicast + 地å€æ€§æµé‡èª¿åº¦
主è¦ä¾è³´æ–¼å‚³çµ±çš„ Unicast 架構,也就是æ¯å€‹æ•¸æ“šä¸å¿ƒæˆ–伺æœå™¨ç¾¤æœ‰ä¸€å€‹å”¯ä¸€çš„ IP 地å€ï¼Œæµé‡æ ¹æ“šä¾†æºåœ°å€è¢«å°Žå‘至指定的伺æœå™¨æˆ–數據ä¸å¿ƒã€‚這樣的架構通常通éŽåœ°å€æ€§æµé‡èª¿åº¦ç³»çµ±ï¼ˆæ¯”如 GSLB,全çƒä¼ºæœå™¨è² 載å‡è¡¡ï¼‰ä¾†åˆ†é…è² è¼‰ã€‚
3. 傳統應用層防禦供應商:Unicast + GSLB(全çƒä¼ºæœå™¨è² 載å‡è¡¡ï¼‰
該架構類似於 ISP 資安,也基於 Unicast å’Œ GSLB 技術。它通éŽå…¨çƒä¼ºæœå™¨è² 載å‡è¡¡ä¾†åˆ†ç™¼æµé‡ï¼Œæ ¹æ“šå®¢æˆ¶çš„地ç†ä½ç½®ã€ä¼ºæœå™¨å¥åº·ç‹€æ…‹ç‰å‹•æ…‹èª¿æ•´æµé‡ï¼Œä½†ä¸å…·å‚™ Anycast 這類基於網路層的自動化全çƒæµé‡åˆ†æ•£èƒ½åŠ›ï¼Œä¸»è¦æ˜¯æ供在本地或數據ä¸å¿ƒå…§éƒ¨éƒ¨ç½²ï¼Œä¸”需è¦é‡å°æ¯å€‹æ•¸æ“šä¸å¿ƒæˆ–伺æœå™¨é€²è¡Œå€‹åˆ¥é…置。
4. 傳統防ç«ç‰†/å¨è„…檢測供應商:Unicast + 安全防ç«ç‰† + DDoS 緩解
架構更多集ä¸åœ¨ Unicast å’Œ 安全防ç«ç‰† 上,並整åˆäº† DDoS 緩解 å’Œå¨è„…檢測技術。有的會使用 NGFW(下一代防ç«ç‰†ï¼‰ å’Œ IPS(入侵防è·ç³»çµ±ï¼‰ ä¾†é˜²ç¦¦ç¶²è·¯æ”»æ“Šï¼Œä¸¦åœ¨ç‰¹å®šå ´æ™¯ä¸‹æä¾› DDoS 防è·ï¼Œä½†å…¶æµé‡ç®¡ç†æž¶æ§‹ä»ä¾è³´å‚³çµ±çš„ Unicast å’Œæ‡‰ç”¨å±¤è² è¼‰å‡è¡¡ã€‚
5. 三大公有雲:多å€åŸŸæž¶æ§‹ + 內建æµé‡èª¿åº¦
公有雲多使用多å€åŸŸæž¶æ§‹ï¼Œå®ƒå€‘ä¾è³´ Unicast ä¸¦é€šéŽ DNS 路由 和內建的全çƒæµé‡èª¿åº¦ä¾†åˆ†ç™¼æµé‡ã€‚æ ¹æ“šæµé‡ä¾†æºçš„地ç†ä½ç½®å’Œå€åŸŸè³‡æºçš„å¥åº·ç‹€æ…‹ï¼Œä¾‹å¦‚é€éŽ Route 53ã€Traffic Manager ç‰å·¥å…·ä¾†é€²è¡Œå…¨çƒè² 載å‡è¡¡ã€‚這些調度方å¼æ˜¯åŸºæ–¼æ‡‰ç”¨å±¤çš„調度,而ä¸æ˜¯ç¶²è·¯å±¤çš„自動分發。
6. 傳統 CDN 防禦供應商:Unicast + DNS 路由(CDN 為主)
更多ä¾è³´æ–¼ Unicast 路由,å³æ¯å€‹ä¼ºæœå™¨æœ‰ä¸€å€‹ç¨ç«‹çš„ IP 地å€ï¼Œä¸¦é€éŽ DNS å°Žå‘æµé‡åˆ°æœ€é©åˆçš„伺æœå™¨ã€‚é€éŽæœ¬èº«é¾å¤§çš„ CDN(內容分發網路)架構來分發æµé‡ï¼Œä½†é€™æ˜¯åŸºæ–¼ DNS å±¤ç´šçš„èª¿åº¦ï¼Œè€Œéž Anycast 的自動æµé‡åˆ†æ•£ã€‚å› æ¤ï¼Œé DNS 解æžçš„å…¨çƒæ€§ç¯€é»žç¶²çµ¡ä¾†å¯¦ç¾æµé‡è² 載分é…,並ä¸æ˜¯ Anycast æ–¹å¼ã€‚
架構差異
Anycast å’Œ 三大公有雲(多å€åŸŸæž¶æ§‹ + 內建æµé‡èª¿åº¦) 的差異
- Anycast 是一種完全自動化的基於網路層的技術,它通éŽå–®ä¸€ IP 自動分散æµé‡ï¼Œå應速度快ã€èƒ½è‡ªå‹•æ‡‰å°æµé‡æ¿€å¢žå’Œ DDoS 攻擊,且ä¸éœ€è¦é€²è¡Œè¤‡é›œçš„é…置。
- 多å€åŸŸæž¶æ§‹ + 內建æµé‡èª¿åº¦ 是基於應用層和 DNS 層的技術,å…許ä¼æ¥éˆæ´»é…ç½®ä¸åŒå€åŸŸçš„資æºå’Œæµé‡èª¿åº¦ç–略,é©åˆè¤‡é›œçš„æ¥å‹™éœ€æ±‚,但å¯èƒ½åœ¨æ‡‰å°æ¥µå¤§è¦æ¨¡çš„攻擊時自動化程度ä¸å¦‚ Anycast。
以下為詳述:
1. æµé‡åˆ†é…æ–¹å¼
- Anycast:基於網路層的路由技術,單一 IP 地å€å¯ä»¥å°æ‡‰åˆ°å¤šå€‹åœ°ç†ä½ç½®ä¸åŒçš„伺æœå™¨æˆ–數據ä¸å¿ƒã€‚當æµé‡åˆ°é”網路時,路由å”è°æœƒè‡ªå‹•å°‡æµé‡å°Žå‘è·é›¢æœ€è¿‘的伺æœå™¨ï¼Œå…¨çƒçš„用戶å¯ä»¥è‡ªå‹•è¨ªå•æœ€æŽ¥è¿‘的數據ä¸å¿ƒï¼Œæ¸›å°‘延é²å’Œè² 載壓力。Anycast 是由網際å”è°ï¼ˆå¦‚ BGP 路由å”è°ï¼‰å¯¦ç¾çš„ï¼Œå› æ¤æµé‡çš„分é…是由全çƒè·¯ç”±å™¨å‹•æ…‹å®Œæˆçš„。
- 多å€åŸŸæž¶æ§‹ + 內建æµé‡èª¿åº¦ï¼šAWSã€GCP å’Œ Azure 使用 多å€åŸŸæž¶æ§‹ï¼Œé€™æ„味著它們有多個數據ä¸å¿ƒï¼ˆå€åŸŸï¼‰åˆ†ä½ˆåœ¨ä¸–ç•Œå„地,用戶å¯ä»¥é¸æ“‡åœ¨å“ªå€‹å€åŸŸéƒ¨ç½²è³‡æºã€‚當用戶訪å•æ‡‰ç”¨æ™‚,這些平å°æœƒæ ¹æ“šé…置好的æµé‡è·¯ç”±ç–略來將æµé‡åˆ†é…到ä¸åŒçš„å€åŸŸã€‚這通常由 DNS 路由 或 å…¨çƒä¼ºæœå™¨è² 載å‡è¡¡ï¼ˆGSLB) 完æˆï¼Œä¸¦ä¸”需è¦å…ˆé€²è¡ŒåŸŸå解æžï¼Œæ‰èƒ½å°‡ç”¨æˆ¶çš„æµé‡å°Žå‘最近或最佳的數據ä¸å¿ƒã€‚
2. 自動化程度
- Anycast:完全自動化。當攻擊æµé‡æˆ–æ£å¸¸æµé‡é€²å…¥ç¶²è·¯æ™‚ï¼Œè·¯ç”±å™¨æ ¹æ“šè·é›¢å’Œç¶²è·¯ç‹€æ³è‡ªå‹•é¸æ“‡æœ€å„ªè·¯å¾‘,無需用戶干é 。æµé‡åˆ†æ•£çš„éŽç¨‹æ˜¯ç„¡ç¸«é€²è¡Œçš„,無需進行é¡å¤–çš„ DNS 或應用層è¨å®šã€‚
- 多å€åŸŸæž¶æ§‹ + 內建æµé‡èª¿åº¦ï¼šç›¸å°ä¾†èªªéœ€è¦æ›´å¤šé…ç½®ã€‚å…¬æœ‰é›²æœƒæ ¹æ“šä½¿ç”¨è€…çš„è¨å®šä¾†ç®¡ç†æµé‡åˆ†é…(通常是基於 DNS 路由)。例如,AWS çš„ Route 53ã€Azure çš„ Traffic Manager 或 GCP çš„ Global Load Balancer 都需è¦ç”¨æˆ¶é å…ˆè¨å®šè·¯ç”±è¦å‰‡ï¼Œå¦‚基於地ç†ä½ç½®ã€å¥åº·ç‹€æ…‹ã€æµé‡åˆ†ä½ˆç–ç•¥ç‰é€²è¡Œæµé‡åˆ†ç™¼ã€‚這種é…置需è¦äº‹å…ˆè¨ç½®ï¼Œä¸¦å¯èƒ½æ ¹æ“šä¸åŒå ´æ™¯åšèª¿æ•´ã€‚
3. 路由技術
- Anycast:基於 BGP 路由å”è°ï¼ˆBorder Gateway Protocolï¼‰é€²è¡Œç¶²è·¯å±¤çš„è·¯ç”±ï¼Œé€™æ˜¯ä¸€ç¨®ç¶²éš›ç¶²è·¯çš„æ ¸å¿ƒæŠ€è¡“ã€‚å®ƒèƒ½å¤ ç¢ºä¿ç•¶å¤šå€‹åœ°é»žä½¿ç”¨ç›¸åŒçš„ IP 地å€æ™‚,æµé‡æœƒè‡ªå‹•è·¯ç”±åˆ°é›¢è«‹æ±‚來æºæœ€è¿‘的伺æœå™¨ã€‚由於這是在網路層進行的æ“作,å應速度éžå¸¸å¿«ï¼Œä¸”自動分散æµé‡ï¼Œç„¡éœ€æ‡‰ç”¨å±¤å¹²é 。
- 多å€åŸŸæž¶æ§‹ + 內建æµé‡èª¿åº¦ï¼šä¸»è¦ä¾è³´æ–¼ DNS 路由 å’Œ æ‡‰ç”¨å±¤çš„è² è¼‰å‡è¡¡ã€‚當用戶發出請求時,首先需è¦é€²è¡ŒåŸŸå解æžï¼ŒDNS ç³»çµ±æœƒæ ¹æ“šé å…ˆè¨ç½®çš„路由è¦å‰‡åˆ†é…用戶æµé‡åˆ°ç‰¹å®šçš„數據ä¸å¿ƒå€åŸŸã€‚這種基於 DNS çš„æ–¹å¼è¼ƒ Anycast æ…¢ä¸€äº›ï¼Œå› ç‚º DNS 解æžéœ€è¦å¤šæ¥æ“作,而且調度決ç–ä¾è³´æ–¼æ‡‰ç”¨å±¤çš„è¦å‰‡ï¼Œè€Œéžç¶²è·¯å±¤è‡ªå‹•å®Œæˆã€‚
4. æ‡‰å° DDoS 攻擊的能力
- Anycastï¼šå› ç‚º Anycast 在網路層進行分散,當發生 DDoS 攻擊時,攻擊æµé‡æœƒè‡ªå‹•åˆ†æ•£åˆ°å…¨çƒå¤šå€‹æ•¸æ“šä¸å¿ƒã€‚這使得單一伺æœå™¨æˆ–地å€ä¸æœƒæˆç‚ºæ”»æ“Šçš„焦點,具有天然的抗 DDoS 能力。攻擊者需è¦ç™¼å‹•å¤§ç¯„åœçš„å…¨çƒæ”»æ“Šæ‰èƒ½å°æ‰€æœ‰æ•¸æ“šä¸å¿ƒé€ æˆå£“力。
- 多å€åŸŸæž¶æ§‹ + 內建æµé‡èª¿åº¦ï¼šå…¬æœ‰é›²å¹³å°ä¹Ÿæœ‰ DDoS 防è·ï¼Œä½†å®ƒå€‘通常基於應用層和 DNS 層來實ç¾ã€‚當發生 DDoS 攻擊時,這些平å°å¯ä»¥é€éŽæ™ºèƒ½ DNS 調度和應用層的防è·ï¼ˆå¦‚ WAF å’Œæµé‡é™é€Ÿï¼‰ä¾†åˆ†æ•£æ”»æ“Šæµé‡ã€‚ä¸éŽï¼Œç”±æ–¼ DNS 層有其固有的解æžæ™‚間,防禦å應速度å¯èƒ½ç•¥éœæ–¼ Anycast。
Unicast 和 Anycast 差異
- Unicast 是傳統的點å°é»žé€šä¿¡æ–¹å¼ï¼Œæ•¸æ“šåŒ…被發é€åˆ°å–®ä¸€çš„目的地 IP 地å€ï¼Œé©åˆéœ€è¦éœæ…‹é…置和集ä¸ç®¡ç†çš„應用。
- Anycast 則是將åŒä¸€ IP 地å€åˆ†é…給多個地ç†ä¸Šåˆ†æ•£çš„節點,通éŽå‹•æ…‹è·¯ç”±å’Œè‡ªå‹•æµé‡åˆ†ç™¼å¯¦ç¾ä½Žå»¶é²ã€é«˜å¯ç”¨æ€§å’ŒæŠ— DDoS 能力,é©åˆéœ€è¦å…¨çƒåˆ†ç™¼å’Œé«˜æ•ˆæµé‡è™•ç†çš„應用。
1. 概念
Unicast:
å–®æ’:Unicast 是一種點å°é»žçš„通信方å¼ï¼ŒæŒ‡çš„是從一個單一的來æºè¨å‚™å‘一個單一的目的è¨å‚™ç™¼é€æ•¸æ“šåŒ…。æ¯å€‹æ•¸æ“šåŒ…都有一個唯一的目的地 IP 地å€ï¼Œé€™ä½¿å¾—æ¯å€‹æ•¸æ“šåŒ…都是é‡å°ç‰¹å®šè¨å‚™é€²è¡Œå‚³é€çš„。
路由:當一個數據包通éŽç¶²è·¯æ™‚ï¼Œå®ƒæœƒæ ¹æ“šç›®çš„åœ° IP 地å€é€²è¡Œè·¯ç”±ï¼Œä¸¦ä¸”åªæœ‰åˆ°é”該目的地è¨å‚™çš„路由器會處ç†è©²æ•¸æ“šåŒ…。
Anycast:
ä»»æ’:Anycast 是一種將åŒä¸€å€‹ IP 地å€åˆ†é…給多個地ç†ä¸Šåˆ†æ•£çš„伺æœå™¨æˆ–節點的技術。當數據包被發é€åˆ°é€™å€‹ IP 地å€æ™‚,網路路由器會將æµé‡è·¯ç”±åˆ°è·é›¢ä¾†æºè¨å‚™æœ€è¿‘的節點。
路由:Anycast 使用 BGP(邊界網關å”è°ï¼‰ä¾†å¯¦ç¾æµé‡çš„è‡ªå‹•è·¯ç”±ï¼Œæ ¹æ“šç¶²è·¯æ‹“æ’²å’Œè·¯ç”±è¡¨å°‡æ•¸æ“šåŒ…ç™¼é€åˆ°æœ€ä½³çš„伺æœå™¨ç¯€é»žã€‚
2. æµé‡åˆ†ç™¼
Unicast:
單點發é€ï¼šæ•¸æ“šåŒ…從一個來æºé»žç™¼é€åˆ°ä¸€å€‹ç›®çš„點,這æ„味著æ¯å€‹æ•¸æ“šåŒ…éƒ½å¿…é ˆç¨ç«‹åœ°ç¶“éŽç¶²è·¯ä¸çš„æ¯ä¸€å€‹è·¯ç”±å™¨ï¼Œç›´åˆ°åˆ°é”目的è¨å‚™ã€‚
éœæ…‹è·¯ç”±ï¼šæµé‡åˆ†ç™¼ä¾è³´æ–¼éœæ…‹é…置的路由ç–略和è¨å‚™çš„è² è¼‰å‡è¡¡ï¼Œé€šå¸¸éœ€è¦æ‰‹å‹•é…置和管ç†ã€‚
Anycast:
多點接收:數據包被發é€åˆ°å…·æœ‰ç›¸åŒ IP 地å€çš„多個伺æœå™¨ç¯€é»žã€‚網路ä¸çš„路由器會自動é¸æ“‡æœ€è¿‘的或最優的節點來處ç†æµé‡ã€‚
動態路由:Anycast 使用 BGP é€²è¡Œå‹•æ…‹è·¯ç”±ï¼Œæ ¹æ“šç¶²è·¯ç‹€æ³å’Œè·¯ç”±è¡¨è‡ªå‹•èª¿æ•´æµé‡çš„路由路徑。
3. 抗 DDoS 能力
Unicast:
集ä¸è™•ç†ï¼šDDoS 攻擊通常會集ä¸æ–¼å–®ä¸€çš„伺æœå™¨æˆ– IP 地å€ã€‚由於æµé‡è¢«ç›´æŽ¥ç™¼é€åˆ°ç‰¹å®šçš„伺æœå™¨ï¼Œé€™ä½¿å¾—攻擊æµé‡æ›´å®¹æ˜“導致伺æœå™¨éŽè¼‰ã€‚
防è·æŒ‘戰:在 Unicast 系統ä¸ï¼Œé˜²è·å’Œç·©è§£ DDoS 攻擊å¯èƒ½éœ€è¦å°ˆé–€çš„è¨å‚™å’ŒæŠ€è¡“來處ç†é›†ä¸æ”»æ“Šæµé‡ã€‚
Anycast:
分散處ç†ï¼šAnycast å¯ä»¥å°‡æ”»æ“Šæµé‡åˆ†æ•£åˆ°å¤šå€‹åœ°ç†ä½ç½®çš„節點,這樣單一節點ä¸æœƒæ‰¿å—éŽå¤šçš„攻擊æµé‡ã€‚這種分散的特性使 Anycast 在應å°å¤§è¦æ¨¡ DDoS 攻擊時更具優勢。
天然防è·ï¼šAnycast 的分散架構æ供了天然的 DDoS 防è·ï¼Œå› 為攻擊æµé‡è¢«åˆ†æ•£åˆ°å¤šå€‹ç¯€é»žï¼Œæ¸›å°‘äº†å–®ä¸€ç¯€é»žçš„è² æ“”ã€‚
4. 延é²å’Œæ€§èƒ½
Unicast:
固定路由:由於æµé‡æ˜¯ç™¼é€åˆ°ç‰¹å®šçš„伺æœå™¨ï¼Œå»¶é²å–決於網路路由的長度和伺æœå™¨çš„處ç†èƒ½åŠ›ã€‚這å¯èƒ½æœƒå°Žè‡´è¼ƒé«˜çš„延é²ï¼Œç‰¹åˆ¥æ˜¯ç•¶ä¼ºæœå™¨è·é›¢ç”¨æˆ¶è¼ƒé 時。
性能å—é™ï¼šç¶²è·¯è·¯ç”±å’Œè² 載å‡è¡¡ä¾è³´æ–¼éœæ…‹é…置,å¯èƒ½æœƒå°Žè‡´æ€§èƒ½ç“¶é ¸å’Œå»¶é²å•é¡Œã€‚
Anycast:
低延é²ï¼šAnycast 使æµé‡èƒ½å¤ 自動路由到最近的節點,這樣å¯ä»¥æ¸›å°‘延é²ä¸¦æ高性能。å°æ–¼å…¨çƒåˆ†å¸ƒçš„用戶,Anycast å¯ä»¥æ供更快速的響應時間。
高效性能:æµé‡åˆ†ç™¼å’Œè² 載å‡è¡¡æ˜¯å‹•æ…‹çš„ï¼Œæ ¹æ“šç¶²è·¯ç‹€æ³è‡ªå‹•èª¿æ•´ï¼Œé€™å¯ä»¥æ高整體性能和å¯ç”¨æ€§ã€‚
5. æ‡‰ç”¨å ´æ™¯
Unicast:
單一æœå‹™å™¨ï¼šé©ç”¨æ–¼æµé‡é›†ä¸æ–¼å–®ä¸€ä¼ºæœå™¨æˆ–數據ä¸å¿ƒçš„æ‡‰ç”¨å ´æ™¯ï¼Œå¦‚ä¼æ¥å…§éƒ¨æ‡‰ç”¨å’Œç‰¹å®šçš„ Web æœå‹™ã€‚
固定路由:é©åˆéœ€è¦éœæ…‹æµé‡ç®¡ç†å’Œå®šåˆ¶åŒ–é…置的應用。
Anycast:
å…¨çƒ CDN å’Œ DNS:é©ç”¨æ–¼éœ€è¦å…¨çƒå…§å®¹åˆ†ç™¼å’Œé«˜æ•ˆæµé‡è™•ç†çš„æ‡‰ç”¨å ´æ™¯ï¼Œå¦‚ CDN å’Œ DNS æœå‹™ã€‚
分布å¼æœå‹™ï¼šé©åˆéœ€è¦ä½Žå»¶é²ã€é«˜å¯ç”¨æ€§å’ŒæŠ— DDoS 能力的應用,如大è¦æ¨¡çš„ Web æœå‹™å’Œåœ¨ç·šæ‡‰ç”¨ã€‚
為什麼 Cloudflare Anycast 會在 Noname057 攻擊ä¸å½¢æˆå„ªå‹¢
本次 Noname057 攻擊給許多 IT, MIS, Security and Infra åŒä»è¨±å¤šéº»ç…©ï¼ŒåŒ…括網路æµé‡æ¿€å¢žã€ç³»çµ±ä¸ç©©å®šã€åŸºç¤Žè¨æ–½å¼±é»žã€è¨å‚™æ‰›ä¸ä½ã€å應時間困難ã€è‡¨æ™‚é…置困難ã€äººåŠ›é™åˆ¶......這些å•é¡Œéœ€è¦ IT 團隊具備éˆæ´»çš„應急能力ã€é«˜æ•ˆèƒ½ä¸”易上手的工具,而 Cloudflare Anycast 架構åŠæ˜“用性,æ°å¥½ç«™åœ¨æœ¬æ¬¡æ‡‰å°æŒ‘戰的利基點,包括:
1. å…¨çƒæµé‡åˆ†æ•£æ¸›å°‘è² è¼‰
在傳統架構ä¸ï¼Œå–®ä¸€åœ°å€æˆ–特定數據ä¸å¿ƒå¸¸å¸¸æœƒå› 大é‡çš„惡æ„æµé‡å—到壓力,從而導致æœå‹™ä¸æ–·ã€‚Cloudflare Anycast 網路å¯ä»¥å°‡æ”»æ“Šæµé‡è‡ªå‹•åˆ†é…åˆ°å…¶å…¨çƒ 300+ 個數據ä¸å¿ƒã€‚這æ„味著å³ä½¿ Noname057 發動大è¦æ¨¡ DDoS 攻擊,攻擊æµé‡æœƒè¿…速分散,單一伺æœå™¨æˆ–地å€ä¸æœƒæ‰¿å—全部壓力,é¿å…了系統éŽè¼‰æˆ–癱瘓。
相較於他家:許多傳統防禦架構採用的 Unicast(單æ’)模å¼ï¼Œæœƒå°‡æµé‡è·¯ç”±è‡³ç‰¹å®šæ•¸æ“šä¸å¿ƒæˆ–伺æœå™¨ï¼Œé€™ä½¿å¾—在é¢è‡¨å¤§è¦æ¨¡æ”»æ“Šæ™‚,該數據ä¸å¿ƒæˆç‚ºæ”»æ“Šçš„ç“¶é ¸ã€‚
2. 第一次就上手
簡單的界é¢å’Œå·¥å…·ï¼šCloudflare æ供直觀易用的管ç†ç•Œé¢å’Œå·¥å…·ï¼Œé€™ä½¿å¾—å³ä¾¿åœ¨æ‡‰å°è¤‡é›œæ”»æ“Šæ™‚,æ“ä½œä¹Ÿèƒ½å¤ ç°¡åŒ–ã€‚ç”¨æˆ¶å¯ä»¥å¿«é€Ÿè¨å®šå’Œèª¿æ•´å®‰å…¨ç–略,從而更高效地管ç†æµé‡å’Œé˜²ç¦¦æ©Ÿåˆ¶ã€‚
相較於他家:在åµæ¸¬æ”»æ“Šå¾Œå¯èƒ½éœ€è¦äººå·¥ä»‹å…¥æˆ–手動調整防禦ç–略,這導致了å應時間較長,而 Cloudflare 的系統完全自動化,能å³æ™‚åšå‡ºå應,æå‡é˜²ç¦¦æ•ˆçŽ‡ã€‚
3. ä¸æœƒè®“ä½ ä¾†ä¸åŠé…ç½®
Cloudflare çš„ Anycast 架構與其內建的 DDoS 緩解系統無縫çµåˆï¼Œç•¶ç³»çµ±åµæ¸¬åˆ°æ”»æ“Šæµé‡æ™‚,能快速啟動自動防禦機制。å¯ä»¥åœ¨æ”»æ“Šç™¼ç”Ÿæ™‚自動é©æ‡‰æµé‡è®ŠåŒ–,這樣å¯ä»¥å¤§å¤§é™ä½Žéƒ¨ç½²éŽç¨‹ä¸çš„錯誤風險。這å°æ–¼è™•æ–¼æ”»æ“Šé¢¨éšªä¸çš„ä¼æ¥ä¾†èªªå°¤ç‚ºé‡è¦ã€‚
相較於他家:用戶å¯èƒ½éœ€è¦é¢å°æ›´å¤šçš„é…ç½®é¸é …,管ç†èµ·ä¾†ç›¸å°è¤‡é›œã€‚雖然這帶來了更多的控制的機會,但å°æ–¼è¿½æ±‚快速部署和簡單防禦的客戶來說,實在沒有å¸ç¿’時間。
4. ä¾›æ‡‰å•†æƒ…å ±å……è¶³
Cloudflare ä¸åƒ…僅是一個基於 Anycast 的網路架構,還æ“有全çƒç¯„åœçš„å¨è„…æƒ…å ±ç³»çµ±ã€‚é€™ä½¿å¾—ç•¶ Noname057 攻擊å°ç£æ™‚,Cloudflare å¯ä»¥åˆ©ç”¨ä¾†è‡ªå…¶ä»–地å€çš„攻擊數據,迅速應å°é¡žä¼¼çš„攻擊模å¼ï¼Œä¸¦æ›´æ–°å…¶é˜²ç¦¦ç–略,æå‡æ•´é«”的應å°é€Ÿåº¦å’Œç²¾ç¢ºæ€§ã€‚
相較於他家:其他公å¸å¯èƒ½æ²’有 Cloudflare 如æ¤å»£æ³›çš„å¨è„…數據和全çƒç¶²è·¯ï¼Œé›£ä»¥åšåˆ°å¦‚æ¤å…¨é¢çš„防禦和å³æ™‚æƒ…å ±æ›´æ–°ã€‚
雖然有些供應商也會號稱æ“有強大的全çƒå¨è„…æƒ…å ±ç³»çµ±ï¼Œä½†ç”±æ–¼å…¶ç³»çµ±çš„è¨è¨ˆæ›´åé‡æ–¼å¤§åž‹ä¼æ¥å’Œæ‡‰ç”¨å±¤å®‰å…¨ï¼Œå¯èƒ½æœƒåœ¨å…¨çƒå¨è„…快速響應和 DDoS 攻擊的防禦å應速度上ç¨é¡¯é²ã€‚Cloudflare å› ç‚ºå°ˆæ³¨æ–¼åŸºæ–¼ç¶²è·¯å±¤å’Œæ‡‰ç”¨å±¤çš„å…¨è‡ªå‹•åŒ–é˜²ç¦¦ï¼Œåœ¨æ¤æ–¹é¢æ›´å…·å„ªå‹¢ã€‚
總çµ
Cloudflare çš„ Anycast 網路架構 在é¢å° Noname057 這類大è¦æ¨¡ã€è·¨åœ‹ç•Œçš„ DDoS 攻擊ä¸ï¼Œå±•ç¾äº†å¼·å¤§çš„分散æµé‡ã€é˜²æ¢å–®é»žç“¶é ¸çš„能力。相比其他傳統或集ä¸åŒ–的架構,Cloudflare èƒ½å¤ å¿«é€ŸéŸ¿æ‡‰æ”»æ“Šï¼Œé™ä½Žå»¶é²ï¼ŒåŒæ™‚æ“有強大的擴展性和全çƒå¨è„…æƒ…å ±æ”¯æŒï¼Œé€™äº›å„ªå‹¢ä½¿å¾— Cloudflare DDoS Protection 在這次é‡å°å°ç£çš„攻擊ä¸ä½”æ“šäº†æ˜Žé¡¯çš„æŠ€è¡“é ˜å…ˆåœ°ä½ã€‚
领英推è
Here is the translation of the provided text into English:
Why Anycast Networks Are Becoming the Top Choice for Protecting Businesses in the Age of Complex Cyber Attacks
In the attack by the pro-Russian hacker group NoName057 on Taiwan, Anycast network architecture demonstrated significant advantages. Anycast is a technology that allows a single IP address to be served by multiple data centers simultaneously. This enables attack traffic to be automatically distributed across data centers worldwide, thereby greatly reducing the risk of single-point bottlenecks.
Current Situation
In Taiwan, the major network security and distributed defense services in use include local ISP providers, the three major public clouds, and other cloud architectures. Although these services offer similar defensive capabilities, they are not fully based on Anycast architecture. Instead, they utilize other architectures for traffic distribution and attack mitigation. The common architectures used by Taiwanese enterprises are as follows:
1. Anycast Architecture
Based on network-layer global distribution technology, Anycast allows a single IP address to correspond to multiple servers, with BGP routing automatically directing traffic to the nearest or best server. When traffic or attacks occur, the global network automatically disperses traffic across different nodes, providing inherent DDoS protection and load balancing without additional DNS settings or application-layer intervention.
2. Local ISP Security Providers: Unicast + Regional Traffic Scheduling
Primarily relies on traditional Unicast architecture, where each data center or server cluster has a unique IP address, and traffic is directed to specific servers or data centers based on the source region. This architecture usually employs regional traffic scheduling systems (such as GSLB, Global Server Load Balancing) to distribute load.
3. Traditional L7 Defense Providers: Unicast + GSLB (Global Server Load Balancing)
This architecture is similar to that of local ISP security providers, also based on Unicast and GSLB technologies. It distributes traffic through global server load balancing, dynamically adjusting traffic based on customer geographical location, server health status, etc. However, it does not possess the network-layer automated global traffic dispersion capability of Anycast, mainly providing local or data center-level deployment and requiring individual configuration for each data center or server.
4. Traditional Firewall/Threat Detection Providers: Unicast + Security Firewalls + DDoS
Mitigation This architecture focuses more on Unicast and security firewalls, integrating DDoS mitigation and threat detection technologies. Some use NGFW (Next-Generation Firewalls) and IPS (Intrusion Prevention Systems) to defend against network attacks and provide DDoS protection in specific scenarios. However, its traffic management architecture still relies on traditional Unicast and application-layer load balancing.
5. Major Public Clouds: Multi-Region Architecture + Built-in Traffic Scheduling
Public clouds often use a multi-region architecture, relying on Unicast and DNS routing along with built-in global traffic scheduling to distribute traffic. Based on the geographical location of traffic sources and the health of regional resources, these public cloud platforms use tools like Route 53 and Traffic Manager for global load balancing. These scheduling methods are application-layer-based rather than network-layer automatic distribution.
6. Traditional CDN Defense Providers: Unicast + DNS Routing (Primarily CDN)
More reliant on Unicast routing, where each server has a separate IP address, and traffic is directed to the most suitable server via DNS. The large CDN (Content Delivery Network) architecture distributes traffic but is based on DNS-level scheduling rather than Anycast's automatic traffic dispersion. Therefore, it uses a globally distributed node network based on DNS resolution for traffic load distribution, which is not the same as the Anycast method.
Architectural Differences
Anycast vs. Multi-Region Architecture + Built-in Traffic Scheduling
Anycast is a fully automated, network-layer technology that distributes traffic through a single IP address. It responds quickly, automatically handles traffic spikes and DDoS attacks, and requires no complex configuration.
Multi-Region Architecture + Built-in Traffic Scheduling is based on application-layer and DNS-layer technologies, allowing businesses to flexibly configure resources and traffic routing strategies across different regions. While it is suitable for complex business needs, its level of automation in dealing with large-scale attacks may not match that of Anycast.
Here are the detailed differences:
1. Traffic Distribution Method
- Anycast: Based on network-layer routing technology, Anycast allows a single IP address to correspond to multiple servers or data centers in different geographical locations. When traffic reaches the network, routing protocols automatically direct it to the nearest server. Users worldwide can automatically connect to the closest data center, reducing latency and load pressure. Anycast is implemented through internet protocols like BGP (Border Gateway Protocol), so traffic distribution is dynamically managed by global routers.
- Multi-Region Architecture + Built-in Traffic Scheduling: AWS, GCP, and Azure use a multi-region architecture, meaning they have multiple data centers (regions) distributed worldwide. Users can choose where to deploy resources. When users access applications, these platforms use configured traffic routing strategies to direct traffic to different regions. This is typically done through DNS routing or Global Server Load Balancing (GSLB), requiring domain name resolution to route user traffic to the nearest or optimal data center.
2. Level of Automation
- Anycast: Fully automated. When attack or regular traffic enters the network, routers automatically select the optimal path based on distance and network conditions, requiring no user intervention. The process of traffic dispersion is seamless, with no need for additional DNS or application-layer configuration.
- Multi-Region Architecture + Built-in Traffic Scheduling: Requires relatively more configuration. Public clouds manage traffic distribution based on user settings, often through DNS routing. For example, AWS's Route 53, Azure's Traffic Manager, or GCP's Global Load Balancer require users to pre-configure routing rules based on geographical location, health status, traffic distribution strategies, etc. This configuration needs to be set up in advance and may require adjustments based on different scenarios.
3. Routing Technology
- Anycast: Utilizes BGP routing protocol for network-layer routing, a core technology of the internet. It ensures that when multiple locations use the same IP address, traffic is automatically routed to the server closest to the request source. Since this operation occurs at the network layer, the response speed is very fast, and traffic is automatically distributed without application-layer intervention.
- Multi-Region Architecture + Built-in Traffic Scheduling: Primarily relies on DNS routing and application-layer load balancing. When a user makes a request, domain name resolution is required first. The DNS system allocates user traffic to specific data center regions based on pre-set routing rules. This DNS-based approach is slower compared to Anycast, as DNS resolution involves multiple steps, and scheduling decisions depend on application-layer rules rather than automatic network-layer distribution.
4. Ability to Handle DDoS Attacks
- Anycast: Since Anycast disperses traffic at the network layer, during a DDoS attack, the attack traffic is automatically spread across multiple global data centers. This prevents any single server or region from becoming the attack's focal point, providing inherent DDoS protection. Attackers need to launch a broad global attack to put pressure on all data centers.
- Multi-Region Architecture + Built-in Traffic Scheduling: Public cloud platforms also offer DDoS protection, but it is usually implemented at the application and DNS layers. During a DDoS attack, these platforms can use intelligent DNS scheduling and application-layer defenses (such as WAF and traffic throttling) to disperse the attack traffic. However, due to inherent DNS resolution times, the defensive response may be slightly slower compared to Anycast.
Differences Between Unicast and Anycast
Unicast is a traditional point-to-point communication method where data packets are sent to a single destination IP address, suitable for applications that require static configuration and centralized management.
Anycast involves assigning the same IP address to multiple geographically dispersed nodes. It uses dynamic routing and automatic traffic distribution to achieve low latency, high availability, and DDoS protection, making it ideal for global distribution and efficient traffic handling.
- Concept
- Unicast:
Point-to-Point: Unicast is a point-to-point communication method where data packets are sent from a single source device to a single destination device. Each packet has a unique destination IP address, which means each packet is specifically addressed to a particular device.
Routing: As a packet traverses the network, it is routed based on the destination IP address, and only the router connected to that destination device processes the packet.
- Anycast:
Any-to-Any: Anycast is a technique where the same IP address is assigned to multiple geographically dispersed servers or nodes. When a packet is sent to this IP address, network routers route the traffic to the nearest node to the source device.
Routing: Anycast uses BGP (Border Gateway Protocol) for automatic traffic routing, sending packets to the optimal server node based on network topology and routing tables.
2. Traffic Distribution
- Unicast:
Single Point Transmission: Packets are sent from a source point to a destination point, meaning each packet must independently pass through every router in the network until it reaches the destination device.
Static Routing: Traffic distribution relies on statically configured routing policies and device load balancing, often requiring manual configuration and management.
- Anycast:
Multiple Point Reception: Packets are sent to multiple server nodes with the same IP address. Network routers automatically select the nearest or most optimal node to handle the traffic.
Dynamic Routing: Anycast uses BGP for dynamic routing, automatically adjusting traffic routes based on network conditions and routing tables.
3. DDoS Protection
- Unicast:
Centralized Processing: DDoS attacks typically target a single server or IP address. Since traffic is directed to a specific server, attack traffic can easily overwhelm that server.
Protection Challenges: In a Unicast system, protecting and mitigating DDoS attacks may require specialized equipment and techniques to handle concentrated attack traffic.
- Anycast:
Distributed Processing: Anycast can disperse attack traffic across multiple geographically distributed nodes, so no single node bears excessive attack traffic. This distributed nature provides a natural advantage in mitigating large-scale DDoS attacks.
Inherent Protection: The distributed architecture of Anycast offers built-in DDoS protection, as attack traffic is spread across multiple nodes, reducing the burden on any single node.
4. Latency and Performance
- Unicast:
Fixed Routing: Since traffic is sent to a specific server, latency depends on the length of the network route and the server's processing capabilities. This can result in higher latency, especially when servers are farther from users.
Performance Constraints: Network routing and load balancing rely on static configurations, which may lead to performance bottlenecks and latency issues.
Anycast:
Low Latency: Anycast allows traffic to be automatically routed to the nearest node, reducing latency and improving performance. For globally distributed users, Anycast can provide faster response times.
Efficient Performance: Traffic distribution and load balancing are dynamic, adjusting based on network conditions, which can enhance overall performance and availability.
5. Use Cases
- Unicast:
Single Server: Suitable for scenarios where traffic is concentrated on a single server or data center, such as internal enterprise applications and specific web services.
Fixed Routing: Ideal for applications requiring static traffic management and customized configurations.
- Anycast:
Global CDN and DNS: Suitable for applications requiring global content distribution and efficient traffic handling, such as CDN and DNS services.
Distributed Services: Ideal for applications needing low latency, high availability, and DDoS protection, such as large-scale web services and online applications.
Why Cloudflare’s Anycast Architecture Proved Advantageous During the Noname057 Attack
1. Global Traffic Distribution Reduces Load
In traditional architectures, a single region or specific data center often bears the brunt of malicious traffic, leading to service disruptions. Cloudflare’s Anycast network automatically distributes attack traffic across its 300+ global data centers. This means that even if Noname057 launches a large-scale DDoS attack, the traffic is quickly dispersed, preventing any single server or region from being overwhelmed and avoiding system overload or outages.
Compared to Others: Many traditional defense architectures using Unicast route traffic to specific data centers or servers, creating a bottleneck during large-scale attacks where the data center becomes the focal point of the attack.
2. Immediate Usability
Simple Interface and Tools: Cloudflare provides an intuitive and user-friendly management interface and tools, simplifying operations even in the face of complex attacks. Users can quickly set and adjust security policies, managing traffic and defenses more efficiently.
Compared to Others: Other solutions might require manual intervention or adjustments to defense strategies after detecting an attack, leading to longer response times. Cloudflare’s system is fully automated, allowing for immediate reactions and enhancing defense efficiency.
3. Avoid Configuration Delays
Seamless Integration: Cloudflare’s Anycast architecture integrates seamlessly with its built-in DDoS mitigation systems. When an attack is detected, automatic defense mechanisms are quickly activated. This adaptation to traffic changes during an attack significantly reduces the risk of deployment errors, which is crucial for enterprises at risk of attacks.
Compared to Others: Users may face more configuration options and complex management with other providers. While this offers more control, it lacks the quick deployment and straightforward defense needed by clients who need fast and simple solutions.
4. Comprehensive Threat Intelligence
Global Threat Intelligence: Cloudflare is not just based on Anycast architecture but also has a global threat intelligence system. This allows Cloudflare to utilize attack data from other regions when Noname057 attacks Taiwan, rapidly adapting to similar attack patterns and updating defense strategies to enhance overall response speed and accuracy.
Compared to Others: Other companies may not have as extensive a threat intelligence network as Cloudflare. They might struggle with comprehensive defense and real-time intelligence updates due to their focus on larger enterprises or application-layer security, which may result in slower global threat response and DDoS defense.
While some vendors claim to have powerful global threat intelligence systems, their designs are often more oriented towards large enterprises and application-layer security, which may result in slower response times for global threats and DDoS attacks. Cloudflare, with its focus on automated, network-layer, and application-layer defense, is better positioned in this regard.
許åºç‘œï¼Œå¾žäº‹äº’è¯ç¶²å·¥ä½œ 7 年,其ä¸åŒ…括開發者相關工作 5 年,2022 å¹´åº•åŠ å…¥è³‡å®‰å…¬å¸ï¼Œé¢å‘大ä¸è¯å€è³‡å®‰é•·/技術長/開發人員ç‰æ供資安與網路效能åˆæœŸéœ€æ±‚。
Marsha Hsu, have been working in the internet industry for 7 years, with 5 years of experience specifically in developer-related roles.