Understanding Layer 7 DDoS Attacks and How CDNs Mitigate Them
Application-layer attacks are getting more sophisticated. Here's how our edge network identifies and absorbs them without impacting legitimate traffic.
Layer 7 vs. Volumetric Attacks
Most people think of DDoS attacks as brute-force floods — massive volumes of traffic designed to saturate a network link. Those are Layer 3/4 attacks, and they're relatively straightforward to mitigate: you absorb the traffic at the edge with enough network capacity, drop the malicious packets, and move on.
Layer 7 (application-layer) attacks are different. They target the HTTP/HTTPS layer itself, sending requests that look legitimate but are designed to exhaust server resources — CPU, memory, database connections, or application threads. A single Layer 7 request might trigger a database query, a template render, and a session lookup. Multiply that by 50,000 requests per second from a distributed botnet, and even a powerful origin server will buckle.
Why They're Hard to Stop
The challenge with Layer 7 attacks is distinguishing malicious requests from real users. The requests use valid HTTP methods, carry proper headers, and often come from residential IP addresses (compromised IoT devices, browser botnets). Simple rate-limiting by IP isn't enough — attackers rotate through thousands of IPs, and aggressive rate limits will block legitimate users on shared networks (corporate offices, universities, mobile carriers).
SlamCDN's Mitigation Pipeline
Our Layer 7 DDoS mitigation runs as a multi-stage pipeline at every edge PoP. Each request passes through these stages before reaching the customer's origin:
- Reputation scoring: Every incoming IP is checked against a continuously updated reputation database. We aggregate signals from across our entire network — if an IP has been involved in attacks against any SlamCDN customer, it gets a risk score. High-risk IPs are challenged or rate-limited immediately.
- Behavioral fingerprinting: We analyze request patterns in real-time: request rate, header consistency, TLS fingerprint (JA3), HTTP/2 frame ordering, and navigation patterns. Real browsers have distinctive fingerprints that are difficult for attack tools to replicate perfectly.
- Adaptive rate limiting: Rather than a static requests-per-second threshold, our rate limiter adapts to each customer's normal traffic patterns. We establish a baseline over 7 days and flag deviations. A site that normally receives 500 req/s getting 15,000 req/s from a single ASN triggers automatic mitigation.
- JavaScript challenge: For suspicious traffic that passes the first three stages, we can inject a lightweight JavaScript challenge that verifies the client is a real browser with a functional JS engine. This stops most headless scripts and simple HTTP clients. The challenge is designed to complete in under 200ms on modern browsers.
A Real Attack: What 2M req/s Looks Like
In January 2026, one of our e-commerce customers was targeted by a sustained Layer 7 attack peaking at 2.1 million requests per second. The attack used a botnet of approximately 180,000 residential IPs, each sending only 10-12 requests per second — well below any per-IP rate limit that wouldn't also block real users.
Our behavioral fingerprinting caught it within 3 seconds. The attack traffic had two telltale signals: all requests used identical TLS fingerprints (the botnet nodes were running the same HTTP client library), and the request timing was uniformly distributed (real user traffic is bursty, not uniform). We applied targeted rate limits to the specific JA3 fingerprint and the attack was fully mitigated without a single request reaching the customer's origin.
What You Can Do
DDoS mitigation is included at no extra cost on all SlamCDN plans. It's always on — there's nothing to configure. For customers who want more control, our Edge Rules engine lets you create custom rules: block specific countries, require challenges for certain paths, or set per-endpoint rate limits. Enterprise customers also get access to our security team for custom rule tuning during active incidents.