DDoS scrubbing data proves on-demand is dead

Blog 12 min read

Always-on scrubbing now dominates the environment, eclipsing reactive on-demand models according to April 2026 research by APNIC. APNIC's detecting and characterizing ddos scrubbing from ... This shift confirms that modern network defense has fundamentally abandoned sporadic, attack-triggered responses in favor of continuous proactive protection. The era of waiting for an alert before diverting traffic is effectively over for major autonomous systems.

Shyam Krishna Khadka's analysis of global BGP routing data reveals that leading providers like Cloudflare and Akamai Prolexic increasingly maintain permanent upstream positions rather than dynamically appearing only during crises. By examining five-minute BGP update intervals, the study distinguishes between origin-change and upstream-change mechanics, proving that static routing configurations offer superior durability against volumetric floods. This data-driven approach exposes how these entities filter malicious packets while keeping legitimate flows intact without the latency penalties of activation delays.

Readers will learn the specific architectural differences between always-on and on-demand scrubbing modes through concrete routing examples. The discussion details operational strategies for identifying these behaviors using public BGP data, specifically looking at how protected ASes hand off prefix origination. Finally, the article breaks down the distinct roles of market leaders including Vercara, Imperva, and Radware, demonstrating why their transition to persistent path presence represents the new standard for DDoS mitigation.

The Role of DDoS Scrubbing in Modern Network Defense

DDoS Scrubbing Mechanisms: Always-On vs On-Demand BGP Modes

DDoS scrubbing diverts traffic to specialized infrastructure, a definition data shows is standard for mitigating attack volume. This mechanism filters malicious packets before forwarding clean traffic to the protected Autonomous System. Detection systems combine BGP RIB snapshots with real-time updates; according to APNIC Blog, RIBs provide baseline state while updates capture dynamic changes. Analysis occurs at five-minute intervals, as reported by which PAM Conference Paper, is the standard granularity for capturing routing shifts without overwhelming systems. Operators deploy two primary modes: always-on and on-demand. Always-on configurations permanently place the scrubber as the upstream provider in the AS-PATH. On-demand activation dynamically inserts the scrubber only during detected attacks via origin-change or upstream-change methods. The upstream-change model dominates deployment because it avoids re-originating prefixes, preserving stability during convergence events.

FeatureAlways-On ModeOn-Demand Mode
VisibilityPermanent AS-PATH presenceTemporary AS-PATH insertion
ActivationContinuousTriggered by attack detection
Convergence RiskLow (static route)Moderate (dynamic update)

Adoption remains limited despite proven efficacy. While these top five providers are dominant, they collectively protect only 0.9% of the 1.4 million globally routable prefixes. The dominance of always-on scrubbing over on-demand models suggests a trend towards continuous, proactive defense postures rather than reactive measures in DDoS mitigation strategies. However, the cost of permanent diversion is increased latency for all inbound traffic, even during non-attack periods. Network architects must weigh this constant overhead against the risk of activation delay during sudden volumetric spikes.

11,000 always-on protected prefixes dominate current BGP routing tables. This deployment model forces continuous path validation across the entire internet edge. Operators must accept permanent AS-PATH elongation as the cost for eliminating activation latency during volumetric floods. The trade-off is reduced flexibility; removing a provider requires coordinated BGP policy updates rather than a simple toggle. In contrast, 5,600 on-demand prefixes rely on dynamic upstream manipulation. This approach preserves original path structures until an attack triggers a route change. However, convergence delays during activation create a brief exposure window that always-on architectures avoid entirely. Cloudflare represents a significant portion of this footprint with specific always-on deployments. 2,876 Cloudflare always-on prefixes anchor their protection strategy in permanence.

The decision ultimately rests on whether an organization prioritizes path stability or operational agility during non-attack periods. Network engineers must weigh the constant routing overhead against the risk of delayed mitigation response times.

Origin-Change vs Upstream-Change: Technical Differences in On-Demand Routing

Origin-change scrubbing forces re-originating prefixes, whereas upstream-change preserves the original AS number while altering the path. This distinction defines activation stability during volumetric floods. Data shows operators prefer upstream manipulation because re-originating prefixes risks global convergence delays. The mechanism relies on BGP updates to inject the scrubber as a transit provider rather than an origin. 1,000 prefixes apply this upstream method compared to only 104 using origin shifts. The disparity highlights a clear industry preference for path modification over origin hijacking. However, upstream dependency creates a single point of failure if the scrubber's ASN loses reachability. Operators must weigh path length against origin consistency when designing failover policies. This low penetration suggests most networks still lack automated on-demand defenses.

FeatureOrigin-ChangeUpstream-Change
BGP RoleRe-originates prefixActs as transit
ConvergenceSlower global updateQuicker local prepend
AdoptionRare (104 prefixes)Dominant (1,000 prefixes)
Risk ProfileOrigin validation failuresPath loop potential

The operational burden increases when distinguishing legitimate mitigation from malicious route leaks.

Mechanics of BGP-Based Traffic Diversion and Filtering

BGP RIB Snapshots and Five-Minute Update Intervals for Scrubbing Detection

Static baselines emerge from BGP RIB snapshots while five-minute update intervals capture transient scrubbing events per APNIC Blog data. This architecture separates permanent pathing from dynamic diversion states. Operators analyze routing tables to identify persistent upstreams, then cross-reference rapid update streams for anomalies. The mechanism relies on granular polling to detect short-lived attacks without generating excessive noise.

FeatureRIB Snapshots5-Min Updates
PurposeBaseline stateEvent detection
GranularityDaily/MidnightContinuous stream
Use CaseAlways-on verificationOn-demand triggers

Temporal resolution limits visibility; attacks shorter than the collection window vanish from logs before analysis begins. This gap forces operators to rely on external telemetry for sub-five-minute incidents. Consequently, detection latency becomes a function of polling frequency rather than network speed. Higher frequency polling demands storage overhead that scales linearly with peer count. Most networks accept the five-minute standard as a pragmatic balance between fidelity and resource consumption. Precise state reconstruction requires merging both datasets smoothly.

Identifying AS-per PATH Anomalies in Cloudflare and Vercara Routing Events, prefix 2.58.145.0/24 carrying AS-PATH [513 25091 25091 13335 24864] where 13335 signals upstream-change scrubbing. This pattern identifies Cloudflare as a transit provider rather than the origin, preserving the original AS number while altering the path. Operators must distinguish this from origin-change events where the scrubber re-originates the prefix entirely. Data shows prefix 46.184.90.0/24 classified as origin-change because Vercara originated it between 13:17 and 13:39 on 10 May 2025. Such transient shifts indicate on-demand protection triggered by active volumetric floods.

Anomaly TypePath SignatureOperational Signal
Upstream-ChangeScrubber ASN inserted mid-pathContinuous defense posture
Origin-ChangeScrubber ASN replaces originReactive attack mitigation

Detection logic parses these sequences to flag routing anomalies without relying on payload inspection. The mechanism requires precise timestamp correlation because short-lived attacks may vanish before the next RIB snapshot. A tension exists between detection speed and false-positive rates; rapid path changes often mimic legitimate traffic engineering. Increased operational complexity arises when managing multi-vendor scrubbing policies. Network teams must tune alerting thresholds to avoid noise from routine maintenance windows. Failure to differentiate these modes leads to incorrect capacity planning and misguided peering strategies.

Upstream-Change Versus Origin-Change Frequency Across Substantial Scrubbers

Upstream-change mitigation protects 1,000 prefixes while origin-change covers only 104 instances per APNIC Blog data. Origin-change scrubbing requires the protection provider to re-originate the victim's prefix, temporarily replacing the legitimate Autonomous System Number in global routing tables. This mechanism forces the entire internet to converge on a new path origin, creating significant stability risks during activation. Conversely, upstream-change preserves the original origin AS but inserts the scrubber as a transit hop in the AS-PATH. Operators prefer this method because it avoids the global convergence delays associated with re-originating prefixes. The data confirms a strong industry preference for path manipulation over origin hijacking due to these stability constraints. However, relying on upstream insertion creates a dependency on specific peer relationships that may not exist in all geographic regions.

The implication for network architects is that upstream solutions demand pre-established peering or transit agreements with the scrubbing provider. Without these specific connections, the route leaks required for diversion will fail propagation.

based on Defining Scrubber ASN Signatures in BGP Update Streams

Study Dataset Description, researchers identified scrubber ASNs by manually inspecting technical documentation and mailing list reports. This process establishes the signature baseline required to distinguish malicious floods from legitimate traffic shifts. Analysts cross-reference these known identifiers against update streams from the RIS route collector, which collects updates every five minutes. High-frequency deviations in AS-PATH sequences signal active mitigation rather than standard routing convergence.

Signature ElementDetection MethodOperational Meaning
Known ASNManual verificationConfirms scrubber presence
Update Frequency5-minute intervalsIndicates dynamic activation
Path LengthSequence analysisReveals upstream insertion

Labor intensity limits the maintenance of this allowlist as providers rotate infrastructure. Operators relying solely on automated heuristics risk misclassifying legitimate peering changes as attack vectors. Missing a signature rotation results in total blindness during an active volumetric event. Precise identification remains the only viable defense against obscured attack paths.

Detecting Vercara and Cloudflare On-according to Demand Activation Events

Study Dataset Description, the analysis window spans 1 May 2025 to 30 May 2025, requiring operators to correlate RIS route collector updates with known scrubber signatures. As reported by Scrubbed Prefixes Statistics, Vercara activated 703 prefixes while Cloudflare covered 250, establishing a baseline for expected activation volume. Operators must isolate these specific ASNs within five-minute update streams to distinguish transient attacks from permanent pathing changes.

ProviderPrimary ModeDetection Signal
VercaraUpstream-changeASN appears mid-path
CloudflareUpstream-changeASN prepended to origin
RadwareMixedOrigin or path shift

per Scrubbed Prefixes Statistics, Cloudflare utilized upstream-change for 249 instances versus a single origin-change event, confirming a strong preference for path manipulation over re-origination. This pattern allows the protected network to retain ownership of the prefix while diverting inbound flow through the scrubber. Missing scrubber activation in BGP logs does not guarantee safety; traffic may be diverted via static GRE tunnels invisible to global routing tables. Failure to detect these shifts leaves networks vulnerable to collateral damage from misconfigured upstream filters.

RPKI Invalid Status Risks in Origin-based on Change Scrubbing Modes

Key Takeaways and Future Work, 48% of origin-change prefixes carry RPKI Invalid or NotFound status, creating immediate drop risks. RPKI-invalid routes face rejection by validating Autonomous Systems, effectively nullifying the mitigation effort during an active attack. The mechanism relies on the scrubber re-originating the prefix, yet nearly half lack the necessary Route Origin Authorizations to remain reachable. According to Key Takeaways and Future Work, 12.5% are explicitly Invalid while 35.5% remain NotFound, leaving most traffic vulnerable to silence rather than filtering. Operators assuming activation success face total blackholing if upstream peers enforce strict validation policies. Delegating origination without updating RIR records breaks global reachability. Failure to synchronize DNS, RPKI, and BGP states turns a defense mechanism into a self-inflicted outage.

Strategic Selection Criteria for Scrubber Providers

Always-On Versus On-as reported by Demand Scrubbing Deployment Models, always-on protection covers 11,000 prefixes while on-demand protects 5,600, defining the baseline for traffic diversion strategy. Always-on scrubbing maintains a permanent upstream position in the AS-PATH, eliminating activation latency but consuming continuous routing table space. On-demand models trigger dynamically during attacks, preserving normal pathing until a threat requires upstream-change intervention. The trade-off is measurable: always-on guarantees immediate filtering, whereas on-demand introduces a convergence window where malicious packets may reach the origin. Operators must weigh the stability of static routes against the resource efficiency of dynamic insertion.

Conceptual illustration for Strategic Selection Criteria for Scrubber Providers
Conceptual illustration for Strategic Selection Criteria for Scrubber Providers

Market projections indicate the network security software sector will expand from USD 22.19 billion in 2026 to USD 51.31 billion by 2035, reflecting aggressive capital allocation toward these architectures. A critical tension exists between immediate mitigation and global routing stability; always-on deployments lock traffic onto specific provider paths regardless of attack state, potentially increasing latency for legitimate users. Conversely, on-demand systems risk packet loss during the brief interval required for BGP updates to propagate globally.

Upstream-change mitigation secures 1,000 prefixes compared to only 104 using origin-change, establishing clear operator preference for path manipulation. Data shows this model allows the owner AS flexibility to originate their own prefix without delegating origination to the scrubber AS. Avoiding the need to create Route Origin Authorizations (ROAs) for scrubbers is a key reason for upstream-change preference approach preserves prefix ownership during active attacks while sidestepping RPKI validation failures that plague re-originated traffic.

DimensionUpstream-Change ModelOrigin-Change Model
Origination ControlRetained by OwnerDelegated to Scrubber
RPKI DependencyLow (Path Only)High (Requires ROA)
Deployment ScaleDominant StrategyRare Implementation

The limitation is strict reliance on upstream provider cooperation for path injection. Operators cannot force acceptance if transit peers filter unexpected AS-PATH sequences containing scrubber identifiers. Maintaining clean routing policies becomes complex when multiple upstreams must simultaneously accept the diverted path. The consequence is a fragmented defense posture where protection efficacy depends entirely on neighbor configuration rather than local policy. Failure to verify these constraints results in silent mitigation failures where traffic never reaches the cleaning infrastructure. The operational penalty is severe: a protected prefix becomes unreachable globally instead of merely degraded during an incident. Operators relying on origin-change modes without pre-validating Route Origin Authorizations effectively trade DDoS exposure for total blackout risk.

Risk FactorConsequenceValidation Requirement
Invalid StatusImmediate route drop by peersROA creation mandatory
NotFound StatusVariable reachabilityRegistry publication needed
Valid StatusNormal propagationExisting coverage sufficient

Meanwhile, the limitation is binary; partial validation causes partial outages that defeat high-availability goals. InterLIR advises verifying RPKI Valid coverage before enabling re-originiation policies to prevent self-inflicted denial of service.

About

Alexander Timokhin CEO of InterLIR brings critical industry perspective to the complex topic of DDoS scrubbing and BGP routing analysis. As the leader of a specialized IPv4 marketplace founded in Berlin, Timokhin manages daily operations where network availability and IP reputation are paramount assets. His direct experience overseeing clean BGP announcements and route object validation provides unique insight into how Autonomous Systems interact with upstream providers during mitigation events. While the referenced research by Khadka et al. Technically characterizes scrubbing behaviors, Timokhin's work at InterLIR applies these principles practically by ensuring redistributed IP resources remain secure and reachable. Understanding whether scrubbers act as upstream providers or originate prefixes is not just academic for his team; it directly impacts the security and efficiency of IP leasing services. This intersection of high-level infrastructure management and technical routing dynamics qualifies him to contextualize these findings for network operators seeking resilient solutions.

Conclusion

The dominance of upstream path manipulation reveals a critical fragility: scalability creates dependency. While shifting AS-PATHs protects more prefixes today, this model collapses when transit providers refuse complex path injections or filter unexpected sequences. As attack surfaces expand, relying on neighbor cooperation for traffic diversion introduces a single point of failure that no amount of local policy can override. The industry must pivot from reactive path tweaks to architectural durability where protection does not hinge on peer goodwill. Organizations should mandate always-on scrubbing integration within the next twelve months, but only if they first decouple validation from origination logic to prevent self-inflicted blackouts during crises.

Do not wait for an incident to test these boundaries. Start by auditing your upstream acceptance policies this week to confirm which transit partners will actually honor diverted paths under stress. Verify that your RPKI ROAs explicitly authorize scrubbing centers before attempting any origin changes, ensuring you do not trade DDoS exposure for total unreachability. True defense requires assuming your neighbors will drop your traffic if configurations are not bulletproof.

Frequently Asked Questions

What percentage of global prefixes currently use DDoS scrubbing protection?
Only a tiny fraction of networks utilize these advanced defenses today. Research confirms that dominant providers collectively protect just 0.9% of the 1.4 million globally routable prefixes, indicating massive room for future growth in adoption rates.
How many total prefixes are protected by always-on scrubbing methods?
Always-on configurations now secure the majority of protected network routes globally. Current data shows that always-on protection covers 11,000 prefixes while on-demand protects 5,600, defining the modern shift toward continuous defense postures.
Which on-demand routing method is more common among network operators?
Upstream-change mitigation is far more popular than re-originating prefixes entirely. Strategies show upstream-change mitigation secures 1,000 prefixes compared to only 104 using origin-change, favoring stability during dynamic attack responses.
Why do organizations prefer always-on scrubbing over reactive on-demand models?
Always-on modes eliminate dangerous activation delays during sudden volumetric flood attacks. This approach ensures continuous proactive protection, whereas waiting for alerts before diverting traffic leaves networks vulnerable during critical convergence windows.
What is the main trade-off for implementing permanent upstream scrubbing?
Operators must accept constant routing overhead and potential latency for all inbound traffic. While this eliminates activation delay, the cost involves permanent AS-PATH elongation even during normal, non-attack periods of network operation.