Defending Against the Record-Breaking HTTP/2 Rapid Reset DDoS Attack: A Comprehensive Guide
- SCHEMOX
- Oct 24, 2023
- 4 min read

Table of contents
Introduction
The internet has become an essential part of our daily routines and we rely on it for almost everything from online shopping to education. However, with benefits come drawbacks. One such drawback is the HTTP/2 Rapid Reset DDoS Attack. This attack has become prevalent and can cause severe damage to websites and internet services. As a content marketer, it is essential to provide comprehensive knowledge of the attack, its severity, and the significance of understanding and defending against it. In this blog, we will delve deeper into this attack and provide you with all the necessary information to protect your website against it. So let's dive right in!
What is HTTP/2 Rapid Reset Attack?
HTTP/2 Rapid Reset Attack is a flaw in the HTTP/2 protocol that can be exploited to carry out DDoS attacks. As over 62% of the internet traffic we see uses the HTTP/2 protocol, this vulnerability is high severity. It has been used to create the largest DDoS attack ever seen. This attack is a result of attackers exploiting the ‘RST_STREAM’ functionality within the HTTP/2 protocol. It essentially enables attackers to repeatedly reset connections to a web server. This results in increased CPU and bandwidth consumption, ultimately leading to server overload, rendering your website inoperable.
What makes it a high-severity vulnerability?
The HTTP/2 Rapid Reset Attack is a high-severity vulnerability due to the large scale of the attack it can result in. It can be easily carried out, and in case you’re wondering, it’s nearly impossible to trace the attacker! Therefore it is fitting to say that it poses a grave threat to websites and internet services.
Record-Breaking DDoS Attack: How it Happened
In August, websites and internet services experienced a record-breaking DDoS attack that peaked at over 398 million requests per second. The attack, which was based on the novel HTTP/2 Rapid Reset vulnerability, was larger than any previously reported Layer 7 attacks.
Fortunately, Google's global load-balancing infrastructure helped mitigate the impact of these attacks and prevented any outages. However, the attack served as a reminder of the importance of understanding and defending against HTTP/2 Rapid Reset DDoS attacks.
The attack was devastating due to the prevalence of HTTP/2 on the internet. With over 62% of internet traffic using HTTP/2, this vulnerability poses a high risk to websites and internet services. As a result, protecting against HTTP/2 Rapid Reset attacks should be a top priority for any website owner or operator.
To avoid becoming a victim of such attacks, it is important to implement best security practices and regularly update software and patches. Conducting vulnerability scans and penetration testing are other effective measures. In case of an attack, it is important to identify the signs, take necessary steps to mitigate the damage, and report the attack.
Why HTTP/2 Rapid Reset Attack is a Threat to Websites
The HTTP/2 Rapid Reset Attack can make websites painfully slow or even completely inaccessible. It can overload servers with an unprecedented volume of traffic, causing them to crash. This can lead to a significant loss in user experience, traffic, and revenue.
Websites that depend on real-time data, such as financial institutions or e-commerce platforms, are particularly vulnerable to this attack. An extended outage can cause immense damage to their reputation and business. Even if a website has strong defences in place for other types of DDoS attacks, it may still be susceptible to the HTTP/2 Rapid Reset Attack.
It's crucial for website owners to protect themselves against this attack by understanding their vulnerabilities and taking appropriate steps. Preventative measures involve updating software and patches, conducting vulnerability scans and penetration testing, and implementing the best security practices. By taking these steps, websites can defend against HTTP/2 Rapid Reset Attacks, and protect themselves from the significant consequences they can bring.
Ways to Protect Your Website Against HTTP/2 Rapid Reset Attack
As an HTTP/2 Rapid Reset attack is a serious threat to websites, taking the necessary steps to protect your site from such attacks is vital. Here are some key actions you can take to defend your website:
Firstly, you can use Cloudflare products such as CDN, WAF, and Bot Management, which provide protection against HTTP/2 Rapid Reset attacks. These solutions can help you safeguard your website from unauthorized access.
Secondly, implementing best security practices such as strict password policies and multi-factor authentication can reduce the risk of attacks. Additionally, regularly updating software and patches can patch the discovered vulnerabilities that make websites vulnerable to Rapid Reset attacks.
Lastly, conducting regular vulnerability scans and penetration testing can help you identify and assess potential vulnerabilities that could be exploited by attackers.
In conclusion, the HTTP/2 Rapid Reset attack is a severe threat to websites but is avoidable with the correct protective measures. Using Cloudflare products, implementing best security practices, regularly updating software and conducting vulnerability scans will help protect your website from HTTP/2 Rapid Reset attacks.
What to do if Your Website is Under HTTP/2 Rapid Reset Attack
Identifying signs of an attack is crucial in mitigating the damage. If you notice an unusual spike in traffic or your website becomes unresponsive, it's time to take action. Check your server logs for HTTP/2 error codes, especially error code "39," which is an indicator of an HTTP/2 Rapid Reset attack. Once confirmed, take the necessary steps to drop all HTTP/2 requests. Reporting the attack to your hosting provider or website security team is equally important. They can assist you in mitigating the attack and reporting to the appropriate authorities. Don't let the HTTP/2 Rapid Reset attack catch you off guard. Stay vigilant and always be prepared to defend your website against such attacks.
Conclusion
In a world where cyber threats constantly evolve, defending against the HTTP/2 Rapid Reset DDoS attack is crucial for website owners. Implementing the necessary steps to protect your website, such as using Cloudflare products, implementing best security practices, updating software regularly, and conducting vulnerability scans and penetration testing, can help prevent an attack. In conclusion, taking the necessary steps to protect your website against the HTTP/2 Rapid Reset DDoS attack is essential to ensure your website's performance, user experience, and revenue. So, take action now to safeguard your online presence.
Comments