Preventing DoS attacks Stay organized with collections Save and categorize content based on your preferences.
This page applies toApigee, but not toApigee hybrid.
View Apigee Edge documentation.![]()
A Denial of Service (DoS) attack is an attempt to render your service or applicationunavailable to your end users. With Distributed Denial of Service (DDoS) attacks, theattackers use multiple resources (often a large number of compromisedhosts/instances) to orchestrate large scale attacks against targets.
The Apigee architecture creates a peering connection between two networks: a Google-managedtenant project (theApigeeVPC) and a customer-managed project (theCustomer VPC). To mitigate or prevent DoS attacks on these networks, be sure to follow theBestPractices for DDoS Protection and Mitigation on Google Cloud Platform (PDF).
If you expose your APIs externally, you can be vulnerable to DoS attacks. To mitigate this,Cloud Load Balancing includes some built-in protections, including:
- Protection by Google Frontend infrastructure: With Cloud Load Balancing, the Google frontend infrastructure terminates user traffic and automatically scales to absorb certain types of attacks (such as SYN floods) before they reach your Compute Engine instances.
- Anycast-based Load Balancing: Cloud Load Balancing enables a single anycast IP to front-end Apigee instances in all regions. Traffic is directed to the closest backend; in the event of a DDoS attack, GCLB increases the surface area to absorb the attack by moving traffic to instances with available capacity in any region where backends are deployed.
In addition to Cloud Load Balancing, you can add Google Cloud Armor to protect your API endpointsagainst DoS and web attacks. Cloud Armor provides benefits such as:
- IP-based and geo-based access control: Filter your incoming traffic based on IPv4 and IPv6 addresses or address ranges (CIDRs). Enforce geography-based access controls to allow or deny traffic based on source geo using Google's geoIP mapping.
- Support for hybrid and multi-cloud deployments: Help defend applications from DDoS or web attacks and enforce Layer 7 security policies whether your application is deployed on Google Cloud or in a hybrid or multi-cloud architecture.
- Visibility and monitoring: Easily monitor all of the metrics associated with your security policies in the Cloud Monitoring dashboard. You can also view suspicious application traffic patterns from Cloud Armor directly in the Security Command Center dashboard.
- Pre-configured WAF rules: Out-of-the-box rules from the ModSecurity Core Rule Set to help defend against attacks like cross-site scripting (XSS) and SQL injection. RFI, LFI, and RCE rules are also available in beta. Learn more in our WAF rules guide.
- Named IP Lists: Allow or deny traffic through a Cloud Armor security policy based on a curated Named IP List (beta).
For more information, seeGoogle Cloud Armor.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-15 UTC.