Overview
Traffic Fraud/Bandwidth Abuse refers to the illegal occupation of network resources, such as bandwidth, traffic, and server resources, through malicious methods. For example, attackers may use automated tools to frequently access site resources, forcing enterprises to incur costs for abnormal traffic or causing service disruptions. The core purpose is to consume target resources through a large number of invalid or malicious requests, causing economic losses or service interruption.
Common Forms of Traffic Fraud
- Malicious traffic attacks
- Challenge Collapsar (CC) attacks: Attackers send frequent requests to specific URLs or interfaces (such as login pages and APIs) to exhaust server resources or bandwidth.
- Download fraud/volume fraud: Attackers use automated scripts or "traffic farms" to download a large number of files (such as videos and software packages), consuming CDN traffic or storage resources.
- Content theft
- Resource link theft: Attackers embed website resource (such as images and videos) links into third-party sites to directly consume the bandwidth and traffic of the original site.
- Crawler abuse: Attackers use malicious crawlers to frequently crawl website content, such as product information and databases, leading to significant increases in server load.
- Ad fraud
Differences Between Traffic Fraud and DDoS Attacks
Feature |
Traffic Fraud |
DDoS Attack |
---|---|---|
Purpose |
Consume resources for profit or make profits indirectly. |
The service breaks down. |
Methods |
High-frequency requests, resource theft, and fake traffic |
Massive traffic floods the target server or network. |
Billing |
High bills (such as CDN traffic fees) |
Services are interrupted, but the traffic consumption may be low. |
Concealment |
More covert, potentially disguised as typical user behavior. |
Obvious attack features (such as burst volume traffic) |
The following security policies are provided to mitigate the impact of traffic fraud.
- Risk perceiving
- Rate limiting
- Analysis and locating
- Intelligent defense
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot