Radar has landed - discover the latest DDoS attack trends. Get ahead, stay protected.Get the report
Under attack?

Products

Solutions

Resources

Partners

Why Gcore

  1. Home
  2. Blog
  3. How we protect clients’ servers anywhere in the world. Everything about GRE tunneling

How we protect clients’ servers anywhere in the world. Everything about GRE tunneling

  • By Gcore
  • March 24, 2023
  • 6 min read
How we protect clients’ servers anywhere in the world. Everything about GRE tunneling

How we protect clients’ servers anywhere in the world. Everything about GRE tunneling
We will explain what GRE tunnels are, how they help keep your data safe, and how to configure your routers and hosts to make a GRE tunnel.

For any company that relies heavily on online sales and transactions, the increasing number of cyberattacks targeting e-commerce websites is a growing concern. E-commerce websites are vulnerable to attacks such as distributed denial-of-service (DDoS) and brute-force attacks, which can lead to a loss of valuable business traffic from legitimate customers or your users’ sensitive information being compromised.

Fortunately, you can get another layer of protection remotely whenever your servers are. This is possible due to the generic routing encapsulation (GRE) tunnel. Such a tunnel helps to establish a private connection between your servers or network and a scrubbing center. This allows the protection provider to scan all your incoming traffic for malicious activity and block any potential threats before they can reach your servers. After your incoming traffic has been scanned, all safe traffic is forwarded to your network or servers for processing through the GRE tunnel. Your server’s response is sent through the GRE tunnel to the scrubbing center and the customer.

In this article, we will explain what GRE tunnels are and how they help keep your data safe. We will walk you through how to configure your routers and hosts in your data center to establish a secure and seamless connection to Gcore’s scrubbing center via a GRE tunnel. Specifically, the article will explain how to set up a GRE tunnel interface to communicate over the internet on a Cisco router or a Linux host.

What is a GRE tunnel and how does it work?

A generic routing encapsulation (GRE) tunnel is a network connection that uses the GRE protocol to encapsulate a variety of network layer protocols inside virtual point-to-point links over an Internet Protocol (IP) network. It allows remote sites to be connected to a single network as if they were both directly connected to each other or to the same physical network infrastructure. GRE is often used to extend a private network over the public internet, allowing remote users to securely access resources on the private network.

It might sound like GRE tunnels and VPNs are the same. However, GRE tunnels can transport or forward multicast traffic, which is essential for actions like routing protocol advertisement and for video conferencing applications, while a VPN can only transport unicast traffic. Additionally, traffic over GRE tunnels is unencrypted by default, but VPNs provide different encryption methods via the IPsec protocol suite, and their traffic can be encrypted from end to end. All the same, traffic transmitted across most sites employs encryption standards such as TLS/SSL for all communications.

You can think of a GRE tunnel as a “tunnel” or “subway” that connects two different networks (e.g., your company’s private network and Gcore’s scrubbing center network). Just like how a subway tunnel allows people to travel between different stations, a GRE tunnel allows data to travel between different networks.

The “train” in this analogy is a data packet being sent through the tunnel. These packets are “encapsulated” or wrapped with a GRE header, which tells the network where the packets are coming from and where they’re going, similar to how a subway train has a destination on the front and the back.

Once the packets reach the “destination station,” the GRE header is removed and the original packets are sent to their intended destination. In this way, the data can travel securely and privately over the public internet as if it were on a private network.

Configuring your network hosts for GRE tunneling

Now that you understand what a GRE tunnel is, the next few sections will show you how to set up tunnel interfaces on a Cisco router and on a Linux server within your data center. You’ll also be shown how to configure private IP addresses on these tunnel interfaces and test the connections.

Configuring a GRE tunnel on a Cisco router

First, you’ll set up your Cisco router to establish a connection to Gcore’s scrubbing center via a GRE tunnel over the public internet, as seen in the diagram below:

In the above diagram, both routers have physical public IPs that they can use to directly connect and interact on the internet via their respective ISPs. There’s also a private network behind the routers on both ends and private IPs for the tunnel interfaces (192.168.1.1 for the client router and 192.168.1.2 for the scrubbing center router). Through a public connection over the internet, a private connection is established using the private IPs on the tunnel interface as though the two tunnel interfaces on each device were physically connected directly to the same network.

First, connect to your router, either via a console cable directly or via SSH if you have that configured, and enter the global configuration mode with the following command:

CR1# configure terminal

You can now create a virtual tunnel interface. The tunnel interface can be any number you want. The following example uses 77 and also places you in the interface configuration mode:

CR1(config)# interface tunnel 77

Next, configure the tunnel interface you just created with the private IP address for router CR1:

CR1(config if)# ip address 192.168.1.1 255.255.255.0

Set the tunnel source, or the interface through which the tunnel establishes a connection from your router. In the following example, the source is the public IP of the client router, 3.3.3.1:

CR1(config if)# tunnel source 3.3.3.1

You also need to configure the tunnel destination—in this case, the public IP address of the scrubbing center’s router, through which you connect to that router’s private tunnel interface:

CR1(config if)# tunnel destination 4.4.4.1

As you know, GRE adds extra headers with information to the original packets. This changes the size of the packet by 24 bytes over the standard MTU limit of 1,500 bytes, which may cause packets to drop. You can solve this by reducing the MTU by 24 bytes to 1,476, such that the MTU plus the extra headers will not go over 1,500:

CR1(config if)# ip mtu 1476

Accordingly, you must change the MSS to be 40 bytes lower than the MTU at 1,436:

CR1(config if)# ip tcp adjust-mss 1436

Now, exit to privileged EXEC mode and check the IP configuration on your router:

CR1(config if)# endCR1# show IP interfaces brief

You should have an output similar to the following, showing the tunnel interface with the IP you configured for it:

CR1# show IP interface briefInterface		IP-Address	OK?	Method	Status			ProtocolGigabitEthernet0/0	3.3.3.1		YES	manual	up			upGigabitEthernet0/1	unassigned	YES	NVRAM	down			downGigabitEthernet0/2	unassigned	YES	NVRAM	administratively down	downGigabitEthernet0/3	unassigned	YES	NVRAM	administratively down	downTunnel77		192.168.1.1	YES	manual	up			up

Test the connection to the remote router, SCR1, using the private tunnel IP address 192.168.1.2:

CR1# ping 192.168.1.2

Your output should be similar to the image below, confirming a successful connection:

Finally, save your running config:

CR1# copy running-config startup-config

You have successfully configured your router to establish a connection via a GRE tunnel.

Configuring a GRE tunnel on a Linux server

This section discusses how to set up the tunnel interface and establish a connection over the GRE tunnel to the remote server. This particular setup uses the Ubuntu 20 LTS operating system. Below is a diagram illustrating the configuration for the various aspects of this setup:

Create a new tunnel using the GRE protocol from your server’s public IP address to the remote server’s IP, in this case 13.51.172.192 and 196.43.196.101, respectively:

# ip tunnel add tunnel0 mode gre local 13.51.172.192 remote 196.43.196.101 ttl 255

If you are using an Amazon EC2 instance or similar VPC behind an application firewall or network, then you need to obtain the private IP of the instance because the public IP traffic is just routed to and from the VPC via private IP.

As you can see from the output of the following command, the instance’s private IP is hyphenated in the fully qualified hostname of your VPC:

# hostname -fip-172-31-38-152.eu-north-1.compute.internal

Now you can create the tunnel by replacing the local public IP 13.51.172.192 with the private IP 172.31.38.152 that you just obtained, as seen below. This is not necessary if you are doing this on a physical server.

# ip tunnel add tunnel0 mode gre local 172.31.38.152 remote 196.43.196.101 ttl 255

Next, you need to add a private subnet to be used on the tunnel, which is 192.168.0.2/30 in this example:

# ip addr add 192.168.0.2/30 dev tunnel0

Once that’s done, you can now bring up the tunnel link using the following command:

# ip link set tunnel0 up

Finally, test if the remote server is reachable over the tunnel by pinging its tunnel IP address, as seen in the output below, which signifies a successful connection via the GRE tunnel:

# ping 192.168.0.1 -c4 PING 192.168.0.1 (192.168.0.1) 56(84) bytes of data.64 bytes from 192.168.0.1: icmp_seq=1 ttl=64 time=275 ms64 bytes from 192.168.0.1: icmp_seq=2 ttl=64 time=275 ms64 bytes from 192.168.0.1: icmp_seq=3 ttl=64 time=275 ms64 bytes from 192.168.0.1: icmp_seq=4 ttl=64 time=281 ms--- 192.168.0.1 ping statistics ---4 packets transmitted, 4 received, 0% packet loss, time 3005msrtt min/avg/max/mdev = 274.661/276.239/280.724/ msas

At this point, you must ensure all traffic reaching you via the tunnel has the response routed back via the tunnel by adding some rules to your routing table. Use the commands below:

// Create the routing table# echo '100 GRE' >> /etc/iproute2/rt_tables// Respect the rules for the private subnet via that table# ip rule add from 192.168.0.0/30 table GRE// Set the default route to make sure all traffic goes via the tunnel remote server# ip route add default via 192.168.0.1 table GRE

That’s it! You’ve successfully set up a connection from your server via a GRE tunnel to a scrubbing center.

Conclusion

In this article, you learned what a GRE tunnel is and how it works. We touched on how a GRE tunnel can protect your servers from cyberattacks, such as denial-of-service attacks, by routing the incoming network traffic through Gcore’s scrubbing center. In the end, you’ve walked through how to set up a GRE tunnel connection using either your Cisco router or your Linux server.

We provide powerful web and server protection with a multi-Tbps filtering capacity on all continents except Antarctica. When a high-volume attack occurs, the is less than 1 ms latency. If you are looking for a solution to protect your servers, use Gcore—with GRE tunneling technology, we will protect your server anywhere in the world.

Written by Rexford A. Nyarko

Open Gcore server protection page

Related articles

Introducing Super Transit for outstanding DDoS protection performance

We understand that security and performance for your online services are non-negotiables. That’s why we’re introducing Super Transit, a cutting-edge DDoS protection and acceleration feature designed to safeguard your infrastructure while delivering lightning-fast connectivity. Read on to discover the benefits of Super Transit, who can benefit from the feature, and how it works.DDoS mitigation meets exceptional network performanceSuper Transit intelligently routes your traffic via Gcore’s 180 point-of-presence global network, proactively detecting, mitigating, and filtering DDoS attacks. When an attack occurs, your customers don’t notice any difference: Their connection remains stable and secure. Plus, they get an enhanced end-user experience, as the delay between the end user and the server is significantly reduced, cutting down latency.“Super Transit allows for fast, worldwide access to our DDoS protection services,” explains Andrey Slastenov, Head of Security at Gcore. “This is particularly important for real-time services such as online gaming and video streaming, where delay can significantly impact user experience.”Who needs Super Transit?Super Transit is designed for enterprises that require both high-performance connectivity and strong DDoS protection. Here’s how it helps different roles in your organization:CISOs and security teams: Reduce risks and help ensure compliance by integrating seamless DDoS protection into your network.CTOs and IT leaders: Optimize traffic performance and maintain uninterrupted business operations.Network engineers and security architects: Simplify security management with API, automated attack mitigation, and secure GRE tunneling.How Super Transit worksSuper Transit optimizes performance and security by performing four steps.Traffic diversion: Incoming traffic is automatically routed through Gcore’s global anycast network, where it undergoes real-time analysis. Malicious traffic is blocked before it can reach your infrastructure.Threat detection and mitigation: Using advanced filtering, Super Transit identifies and neutralizes DDoS attacks.Performance optimization: Legitimate requests are routed through the optimal path within Gcore’s high-performance backbone, minimizing latency and maximizing speed.Secure tunneling to your network: Traffic is securely forwarded to your origin via stable tunneling protocols, providing a smooth, uninterrupted, and secure connection.Get Super Transit today for high-performance securitySuper Transit is available now to all Gcore customers. To get started, get in touch with our security experts who’ll guide you through how to get Super Transit up and running. You can also explore our product documentation, which provides a clear and simple guide to configuring the feature.Our innovations are driven by cutting-edge research, enabling us to stay one step ahead of attackers. We release the latest DDoS attack trends twice yearly, so you can make informed decisions about your security needs. Get the H1 2024 report free.Discover the latest DDoS attack trends with Gcore Radar

How gaming studios can use technology to safeguard players

Online gaming can be an enjoyable and rewarding pastime, providing a sense of community and even improving cognitive skills. During the pandemic, for example, online gaming was proven to boost many players’ mental health and provided a vital social outlet at a time of great isolation. However, despite the overall benefits of gaming, there are two factors that can seriously spoil the gaming experience for players: toxic behavior and cyber attacks.Both toxic behavior and cyberattacks can lead to players abandoning games in order to protect themselves. While it’s impossible to eradicate harmful behaviors completely, robust technology can swiftly detect and ban bullies as well as defend against targeted cyberattacks that can ruin the gaming experience.This article explores how gaming studios can leverage technology to detect toxic behavior, defend against cyber threats, and deliver a safer, more engaging experience for players.Moderating toxic behavior with AI-driven technologyToxic behavior—including harassment, abusive messages, and cheating—has long been a problem in the world of gaming. Toxic behavior not only affects players emotionally but can also damage a studio’s reputation, drive churn, and generate negative reviews.The online disinhibition effect leads some players to behave in ways they may not in real life. But even when it takes place in a virtual world, this negative behavior has real long-term detrimental effects on its targets.While you can’t control how players behave, you can control how quickly you respond.Gaming studios can implement technology that makes dealing with toxic incidents easier and makes gaming a safer environment for everyone. While in the past it may have taken days to verify a complaint about a player’s behavior, today, with AI-driven security and content moderation, toxic behavior can be detected in real time, and automated bans can be enforced. The tool can detect inappropriate images and content and includes speech recognition to detect derogatory or hateful language.In gaming, AI content moderation analyzes player interactions in real time to detect toxic behavior, harmful content, and policy violations. Machine learning models assess chat, voice, and in-game media against predefined rules, flagging or blocking inappropriate content. For example, let’s say a player is struggling with in-game harassment and cheating. With AI-powered moderation tools, chat logs and gameplay behavior are analyzed in real time, identifying toxic players for automated bans. This results in healthier in-game communities, improved player retention, and a more pleasant user experience.Stopping cybercriminals from ruining the gaming experienceAnother factor negatively impacting the gaming experience on a larger scale is cyberattacks. Our recent Radar Report showed that the gaming industry experienced the highest number of DDoS attacks in the last quarter of 2024. The sector is also vulnerable to bot abuse, API attacks, data theft, and account hijacking.Prolonged downtime damages a studio’s reputation—something hackers know all too well. As a result, gaming platforms are prime targets for ransomware, extortion, and data breaches. Cybercriminals target both servers and individual players’ personal information. This naturally leads to a drop in player engagement and widespread frustration.Luckily, security solutions can be put in place to protect gamers from this kind of intrusion:DDoS protection shields game servers from volumetric and targeted attacks, guaranteeing uptime even during high-profile launches. In the event of an attack, malicious traffic is mitigated in real-time, preventing zero downtime and guaranteeing seamless player experiences.WAAP secures game APIs and web services from bot abuse, credential stuffing, and data breaches. It protects against in-game fraud, exploits, and API vulnerabilities.Edge security solutions reduce latency, protecting players without affecting game performance. The Gcore security stack helps ensure fair play, protecting revenue and player retention.Take the first steps to protecting your customersGaming should be a positive and fun experience, not fraught with harassment, bullying, and the threat of cybercrime. Harmful and disruptive behaviors can make it feel unsafe for everyone to play as they wish. That’s why gaming studios should consider how to implement the right technology to help players feel protected.Gcore was founded in 2014 with a focus on the gaming industry. Over the years, we have thwarted many large DDoS attacks and continue to offer robust protection for companies such as Nitrado, Saber, and Wargaming. Our gaming specialization has also led us to develop game-specific countermeasures. If you’d like to learn more about how our cybersecurity solutions for gaming can help you, get in touch.Speak to our gaming solutions experts today

The rise of DDoS attacks on Minecraft and gaming

The gaming industry is a prime target for distributed denial-of-service (DDoS) attacks, which flood servers with malicious traffic to disrupt gameplay. These attacks can cause server outages, leading to player frustration, and financial losses.Minecraft, one of the world’s most popular games with 166 million monthly players, is no exception. But this isn’t just a Minecraft problem. From Call of Duty to GTA, gaming servers worldwide face relentless DDoS attacks as the most-targeted industry, costing game publishers and server operators millions in lost revenue.This article explores what’s driving this surge in gaming-related DDoS attacks, and what lessons can be learned from Minecraft’s experience.How DDoS attacks have disrupted MinecraftMinecraft’s open-ended nature makes it a prime testing ground for cyberattacks. Over the years, major Minecraft servers have been taken down by large-scale DDoS incidents:MCCrash botnet attack: A cross-platform botnet targeted private Minecraft servers, crashing thousands of them in minutes.Wynncraft MC DDoS attack: A Mirai botnet variant launched a multi-terabit DDoS attack on a large Minecraft server. Players could not connect, disrupting gameplay and forcing the server operators to deploy emergency mitigation efforts to restore service.SquidCraft Game attack: DDoS attackers disrupted a Twitch Rivals tournament, cutting off an entire competing team.Why are Minecraft servers frequent DDoS targets?DDoS attacks are widespread in the gaming industry, but certain factors make gaming servers especially vulnerable. Unlike other online services, where brief slowdowns might go unnoticed, even a few milliseconds of lag in a competitive game can ruin the experience. Attackers take advantage of this reliance on stability, using DDoS attacks to create chaos, gain an unfair edge, or even extort victims.Gaming communities rely on always-on availabilityUnlike traditional online services, multiplayer games require real-time responsiveness. A few seconds of lag can ruin a match, and server downtime can send frustrated players to competitors. Attackers exploit this pressure, launching DDoS attacks to disrupt gameplay, extort payments, or damage reputations.How competitive gaming fuels DDoS attacksUnlike other industries where cybercriminals seek financial gain, many gaming DDoS attacks are fueled by rivalry. Attackers might:Sabotage online tournaments by forcing competitors offline.Target popular streamers, making their live games unplayable.Attack rival servers to drive players elsewhere.Minecraft has seen all of these scenarios play out.The rise of DDoS-for-hire servicesDDoS attacks used to require technical expertise. Now, DDoS-as-a-service platforms offer attacks for as little as $10 per hour, making it easier than ever to disrupt gaming servers. The increasing accessibility of these attacks is a growing concern, especially as large-scale incidents continue to emerge.How gaming companies can defend against DDoS attacksWhile attacks are becoming more sophisticated, effective defenses do exist. By implementing proactive security measures, gaming companies can minimize risks and maintain uninterrupted gameplay for customers. Here are four key strategies to protect gaming servers from DDoS attacks.#1 Deploy always-on DDoS protectionGame publishers and server operators need real-time, automated DDoS mitigation. Gcore DDoS Protection analyzes traffic patterns, filters malicious requests, and keeps gaming servers online, even during an attack. In July 2024, Gcore mitigated a massive 1 Tbps DDoS attack on Minecraft servers, highlighting how gaming platforms remain prime targets. While the exact source of such attacks isn’t always straightforward, their frequency and intensity reinforce the need for robust security measures to protect gaming communities from service disruptions.#2 Strengthen network securityGaming companies can reduce attack surfaces in the following ways:Using rate limiting to block excessive requestsImplementing firewalls and intrusion detection systemsObfuscating server IPs to prevent attackers from finding them#3 Educate players and moderatorsSince many DDoS attacks come from within gaming communities, education is key. Server admins, tournament organizers, and players should be trained to recognize and report suspicious behavior.#4 Monitor for early attack indicatorsDDoS attacks often start with warning signs: sudden traffic spikes, frequent disconnections, or network slowdowns. Proactive monitoring can help stop attacks before they escalate.Securing the future of online gamingDDoS attacks against Minecraft servers are part of a broader trend affecting the gaming industry. Whether driven by competition, extortion, or sheer disruption, these attacks compromise gameplay, frustrate players, and cause financial losses. Learning from Minecraft’s challenges can help server operators and game developers build stronger defenses and prevent similar attacks across all gaming platforms.While proactive measures like traffic monitoring and server hardening are essential, investing in purpose-built DDoS protection is the most effective way to guarantee uninterrupted gameplay and protect gaming communities. Gcore provides advanced, multi-layered DDoS protection specifically designed for gaming servers, including countermeasures tailored to Minecraft and other gaming servers. With a deep understanding of the industry’s security challenges, we help server owners keep their platforms secure, responsive, and resilient—no matter the type of attack.Want to take the next step in securing your gaming servers?Download our ultimate guide to preventing Minecraft DDoS

How AI enhances bot protection and anti-automation measures

Bots and automated attacks have become constant issues for organizations across industries, threatening everything from website availability to sensitive customer data. As these attacks become increasingly sophisticated, traditional bot mitigation methods struggle to keep pace. Businesses face a growing need to protect their applications, APIs, and data without diminishing the efficiency of essential automated parts and bots that enhance user experiences.That’s where AI comes in. AI-enabled WAAP is a game-changing solution that marries the adaptive intelligence of AI with information gleaned from historical data. This means WAAP can detect and neutralize malicious bot and anti-automation activity with unprecedented precision. Read on to discover how.The bot problem: why automation threats are growingJust a decade ago, use cases for AI and bots were completely different than they are today. While some modern use cases are benign, such as indexing search engines or helping to monitor website performance, malicious bots account for a large proportion of web traffic. Malicious bots have grown from simple machines that follow scripts to complex creations that can convincingly simulate human behaviors.What makes bots particularly dangerous is their ability to evade detection by mimicking human-like patterns. Simple measures like CAPTCHA tests or IP blocking no longer suffice. Businesses need more intelligent systems capable of identifying and mitigating these evolving threats without impacting real users.Defeating automation threats with AI and machine learningToday’s bots don’t just click on links. They fake human activity convincingly, and defeating them involves a lot more than just simple detection. Battling modern bots requires fighting fire with fire by implementing machine learning and AI to create defensive strategies such as blocking credential stuffing, blocking data scraping, and performing behavioral tagging and profiling.Blocking credential stuffingCredential stuffing is a form of attack in which stolen login credentials are used to gain access to user accounts. AI/ML systems can identify such an attack by patterns, including multiple failed logins or logins from unusual locations. These systems learn with each new attempt, strengthening their defenses after every attack attempt.Data scraping blockingScraping bots can harvest everything from pricing data to intellectual property. AI models detect these through the repetitive patterns of requests or abnormally high frequencies of interactions. Unlike basic anti-scraping tools, AI learns new ways that scraping is done, keeping businesses one step ahead.Behavioral tagging and profilingAI-powered systems are quite good at analyzing user behavior. They study the tendencies of session parameters, IP addresses, and interaction rates. For instance, most regular users save session data, while bots do not prioritize this action. The AI system flags suspicious behavior and highlights the user in question for review.These systems also count the recurrence of certain actions, such as clicks or requests. The AI is supposed to build an in-depth profile for every IP or user and find something out of the ordinary to suggest a way to block or throttle the traffic.IP rescoring for smarter detectionOne of the unique capabilities of AI-driven bot protection is Dynamic IP Scoring. Based on external behavior data and threat intelligence, each incoming IP is accorded a risk score. For example, an IP displaying a number of failed login attempts could be suspicious. If it persists, that score worsens, and the system blocks the traffic.This dynamic scoring system does not focus on mere potential threats. It also allows IPs to “recover” if their behavior normalizes, reducing false positives and helping to ensure that real users are not inadvertently blocked.Practical insights: operationalizing AI-driven bot protectionImplementing AI/ML-driven bot protection requires an understanding of both the technology and the operational context in which it’s deployed. Businesses can take advantage of several unique features offered by platforms like Gcore WAAP:Tagging system synergy: Technology-generated tags, like the Gcore Tagging and Analysis Classification and Tagging (TACT) engine, are used throughout the platform to enforce fine-grained security policies and share conclusions and information between various solution components. Labeling threats allows users to easily track potential threats, provides input for ML analysis, and contributes data to an attacker profile that can be applied and acted on globally. This approach ensures an interlinked approach in which all components interact to mitigate threats effectively.Scalable defense mechanisms: With businesses expanding their online footprints, platforms like Gcore scale seamlessly to accommodate new users and applications. The cloud-based architecture makes continuous learning and adaptation possible, which is critical to long-term protection against automation threats.Cross-domain knowledge sharing: One of the salient features of Gcore WAAP is cross-domain functionality, which means the platform can draw from a large shared database of user behavior and threat intelligence. Even newly onboarded users immediately benefit from the insights gained by the platform from its historical data and are protected against previously encountered threats.Security insights: Gcore WAAP’s Security Insights feature provides visibility into security configurations and policy enforcement, helping users identify disabled policies that may expose them to threats. While the platform’s tagging system, powered by the TACT engine, classifies traffic and identifies potential risks, separate microservices handle policy recommendations and mitigation strategies. This functionality reduces the burden on security teams while enhancing overall protection.API discovery and protection: API security is among the most targeted entry points for automated attacks due to APIs’ ability to open up data exchange between applications. Protecting APIs requires advanced capabilities that can accurately identify suspicious activities without disrupting legitimate traffic. Gcore WAAP’s API discovery engine achieves this with a 97–99% accuracy rate, leveraging AI/ML to detect and prevent threats.Leveraging collective intelligence: Gcore WAAP’s cross-domain functionality creates a shared database of known threats and behaviors, allowing data from one client to protect the entire customer base. New users benefit immediately from the platform’s historical insights, bypassing lengthy learning curves. For example, a flagged suspicious IP can be automatically blocked across the network for faster, more efficient protection.Futureproof your security with Gcore’s AI-enabled WAAPBusinesses are constantly battling increasingly sophisticated botnet threats and have to be much more proactive regarding their security mechanisms. AI and machine learning have become integral to fighting bot-driven attacks, providing an unprecedented level of precision and flexibility that no traditional security systems can keep up with. With advanced behavior analysis, adaptive threat models, and cross-domain knowledge sharing, Gcore WAAP establishes new standards of bot protection.Curious to learn more about WAAP? Check out our ebook for cybersecurity best practices, the most common threats to look out for, and how WAAP can safeguard your businesses’ digital assets. Or, get in touch with our team to learn more about Gcore WAAP.Learn why WAAP is essential for modern businesses with a free ebook

How to choose the right technology tools to combat digital piracy

One of the biggest challenges facing the media and entertainment industry is digital piracy, where stolen content is redistributed without authorization. This issue causes significant revenue and reputational losses for media companies. Consumers who use these unregulated services also face potential threats from malware and other security risks.Governments, regulatory bodies, and private organizations are increasingly taking the ramifications of digital piracy seriously. In the US, new legislation has been proposed that would significantly crack down on this type of activity, while in Europe, cloud providers are being held liable by the courts for enabling piracy. Interpol and authorities in South Korea have also teamed up to stop piracy in its tracks.In the meantime, you can use technology to help stop digital piracy and safeguard your company’s assets. This article explains anti-piracy technology tools that can help content providers, streaming services, and website owners safeguard their proprietary media: geo-blocking, digital rights management (DRM), secure tokens, and referrer validation.Geo-blockingGeo-blocking (or country access policy) restricts access to content based on a user’s geographic location, preventing unauthorized access and limiting content distribution to specific regions. It involves setting rules to allow or deny access based on the user’s IP address and location in order to comply with regional laws or licensing agreements.Pros:Controls access by region so that content is only available in authorized marketsHelps comply with licensing agreementsCons:Can be bypassed with VPNs or proxiesRequires additional security measures to be fully effectiveTypical use cases: Geo-blocking is used by streaming platforms to restrict access to content, such as sports events or film premieres, based on location and licensing agreements. It’s also helpful for blocking services in high-risk areas but should be used alongside other anti-piracy tools for better and more comprehensive protection.Referrer validationReferrer validation is a technique that checks where a content request is coming from and prevents unauthorized websites from directly linking to and using content. It works by checking the “referrer” header sent by the browser to determine the source of the request. If the referrer is from an unauthorized domain, the request is blocked or redirected. This allows only trusted sources to access your content.Pros:Protects bandwidth by preventing unauthorized access and misuse of resourcesGuarantees content is only accessed by trusted sources, preventing piracy or abuseCons:Can accidentally block legitimate requests if referrer headers are not correctly sentMay not work as intended if users access content via privacy-focused methods that strip referrer data, leading to false positivesTypical use cases: Content providers commonly use referrer validation to prevent unauthorized streaming or hotlinking, which involves linking to media from another website or server without the owner’s permission. It’s especially useful for streamers who want to make sure their content is only accessed through their official platforms. However, it should be combined with other security measures for more substantial protection.Secure tokensSecure tokens and protected temporary links provide enhanced security by granting temporary access to specific resources so only authorized users can access sensitive content. Secure tokens are unique identifiers that, when linked to a user’s account, allow them to access protected resources for a limited time. Protected temporary links further restrict access by setting expiration dates, meaning the link becomes invalid after a set time.Pros:Provides a high level of security by allowing only authorized users to access contentTokens are time-sensitive, which prevents unauthorized access after they expireHarder to circumvent compared to traditional password protection methodsCons:Risk of token theft if they’re not managed or stored securelyRequires ongoing management and rotation of tokens, adding complexityCan be challenging to implement properly, especially in high-traffic environmentsTypical use cases: Streaming platforms use secure tokens and protected temporary links so only authenticated users can access premium content, like movies or live streams. They are also useful for secure file downloads or limiting access to exclusive resources, making them effective for protecting digital content and preventing unauthorized sharing or piracy.Digital rights managementDigital rights management (DRM) refers to a set of technologies designed to protect digital content from unauthorized use so that only authorized users can access, copy, or share it, according to licensing agreements. DRM uses encryption, licensing, and authentication mechanisms to control access to digital resources so that only authorized users can view or interact with the content. While DRM offers strong protection against piracy, it comes with higher complexity and setup costs than other security methods.Pros:Robust protection against unauthorized copying, sharing, and piracyHelps safeguard intellectual property and revenue streamsEnforces compliance with licensing agreementsCons:Can be complex and expensive to implementMay cause inconvenience for users, such as limiting playback on unauthorized devices or restricting sharingPotential system vulnerabilities or compatibility issuesTypical use cases: DRM is commonly used by streaming services to protect movies, TV shows, and music from piracy. It can also be used for e-books, software, and video games, ensuring that content is only used by licensed users according to the terms of the agreement. DRM solutions can vary, from software-based solutions for media files to hardware-based or cloud-based DRM for more secure distribution.Protect your content from digital piracy with GcoreDigital piracy remains a significant challenge for the media and entertainment industry as it poses risks in terms of both revenue and security. To combat this, partnering with a cloud provider that can actively monitor and protect your digital assets through advanced multi-layer security measures is essential.At Gcore, our CDN and streaming solutions give rights holders peace of mind that their assets are protected, offering the features mentioned in this article and many more besides. We also offer advanced cybersecurity tools, including WAAP (web application and API protection) and DDoS protection, which further integrate with and enhance these security measures. We provide trial limitations for streamers to curb piracy attempts and respond swiftly to takedown requests from rights holders and authorities, so you can rest assured that your assets are in safe hands.Get in touch to learn more about combatting digital piracy

Your ultimate guide to WAAP is here—get the ebook

Our latest ebook Beyond WAF: the ultimate guide to WAAP explores the next generation of cybersecurity and how WAAP can help businesses protect their digital assets.In 2025, a standard WAF (web application firewall) is no longer enough to detect threats and protect companies from malware and other malicious attacks. The rise of artificial intelligence, in particular, is increasing the volume and severity of cyberattacks. Businesses need to adopt WAAP to stay protected, and this ebook explains exactly how and why.What does the ebook cover?Here’s a quick overview of what you can look forward to when you download the ebook.The evolution of cyber threats: It can be hard to keep up with the latest advancements in cyberattacks, particularly with the increasing prevalence of AI—which can be both a boon and a menace. The ebook gives an overview of the cyberthreat landscape and how WAAP, which uses advanced AI to detect threats, consistently monitors and mitigates new and evolving types of attacks.The most common types of threats in 2025: To keep your web applications and APIs protected, it’s important to know what the risks are. The ebook explores different methods that hackers use—such as SQL injections, zero-day attacks, and DDoS attacks— as well as the consequences of such breaches.The non-negotiables of a cybersecurity solution: When looking for a security solution, it may be tempting to cut corners but the potential damage in terms of financial and reputational harm is too big to risk. The ebook explores what’s not up for debate when deciding on a security solution.You’ll also discover real-world use cases, expert security tips, and advice on just how easy it is to implement WAAP into your existing security setup.Discover more about how WAAP can help your businessTo learn more about the ins and outs of WAAP and delve deeper into how cyber threats are changing, how security solutions have evolved, and how you can best protect your business from attacks, get the ebook here.Download the ebook now to stay ahead of evolving cyber threats

Subscribe to our newsletter

Get the latest industry trends, exclusive insights, and Gcore updates delivered straight to your inbox.