An origin server DDoS attack (sometimes referred to as direct-to-origin attack) is a technique used to bypass cloud-based DDoS protections – such as CDNs and WAFs – by targeting the origin server environment directly. Because the malicious traffic avoids the protective proxy layer, it hits the origin server unfiltered, potentially overwhelming systems that are not designed to handle large-scale attack volumes.
These attacks may use volumetric and protocol attack vectors, such as UDP and ICMP floods, as well as application-layer vectors, like HTTP floods or slow-rate attacks. As a result, even organizations with robust cloud-based defenses can suffer outages if their origin server IPs are exposed.
To obtain the IP address of an origin server that is proxied by a cloud CDN & WAF solution, attackers use several techniques, such as:
Organizations that do not own IP blocks (e.g., hosted entirely in public cloud) can fully mask their backend. But even those with their own Autonomous System (AS) or IP ranges can significantly reduce exposure using these methods:
Red Button Asset Discovery Service provides a proactive approach to discovering and securing exposed infrastructure. This includes:
By closing visibility gaps, organizations can stay ahead of attackers and ensure that only filtered traffic ever reaches the origin.