Conversation

Replying to and
Moreover, most bots conducting L7 DDoS don't use real/headless browsers in order to be able to scale their attack, so it's highly likely they'll have a discriminating/inconsistent TLS fingerprint
1
Replying to and
This can also be done directly in Fastly using e.g. developer.fastly.com/reference/vcl/ Another approach to proactively flag malicious IPs is to scrape free proxies. Indeed, most DDoS leverage lot of cheap/know bad IPs. It's frequent to see these free proxies in these attacks.
Replying to and
However, it's risky to block all free proxies by default since some of them may be shared residential IPs. In this case, a simple/less risky solution is to adopt a more agressive rate limiting on these IPs.