Photo of Blue screens of death at LGA airport from the CrowdStrike 2024 July outage.

Measuring the Effects of the CrowdStrike Outage on Internet Traffic

Picture of Vaishnavi Raghavajosyula
Guest Author | Max Planck Institute for Informatics
Categories:
Twitter logo
LinkedIn logo
Facebook logo
July 2, 2025
In short
  • Last year’s faulty CrowdStrike update had a nuanced impact on the Internet traffic of various organizations and sectors.
  • Interference patterns can hide application fault effects in traditional network-level analysis approaches.
  • Service identification and aggregation using DNS information makes these individual waves visible.

On 19 July 2024, the cybersecurity company CrowdStrike rolled out a faulty update for its endpoint protection software. The effects were diverse and global, reportedly affecting 8 million Windows devices and disrupting workplaces, airports, and health services worldwide.

Read: Global Tech Outage Demonstrates Need for Resiliency in Software Systems

Considering the widespread effect, we at the Max Planck Institute for Informatics and Benocs GmbH decided to study how this service level outage impacted Internet traffic.

Our analysis demonstrated that traditional aggregate network-level metrics provide limited information on large application-level disruptions, requiring us to study their effect on application-level traffic.

The Outage Had Minimal Impact on Internet Traffic…

We approached this study using the established lens of traffic-focused network measurements, analyzing the effects of the CrowdStrike incident on the Internet traffic of four European Internet Service Provider (ISP) networks and one European Internet Exchange Point (IXP) network.

While we saw a noticeable decrease in traffic for  ISP-1—around 8.5% on the day of the outage—we didn’t see the same occurring in the other ISPs or IXP.

Time series line graphs showing disruptions to ISP and IXP traffic the week of the incident.
Figure 1 — Total traffic volumes for our 5 Vantage Points, normalized by the maximum traffic observed. The blue area shows the 99.7% confidence interval from 10 weeks before the incident. The blue line shows traffic for the incident week. Bars show the relative traffic difference between the outage week and median traffic at that time of day over the 10 weeks.

We attempted to see any effects using other network-level metrics, such as port-level, subnet-level traffic, and packet sizes, but we reached the same conclusion. See our paper for more details.

…But it Did Have a Significant Impact on Other Applications and Services

Given the above, we used a different methodology to correlate flows with DNS-level traces and infer traffic levels per application. An application consists of a manually curated set of domains, and we had traffic volume inference for approximately 1,500 pre-selected applications. Luckily, CrowdStrike was one of them! 

In Figure 2, we see across all the ISPs and IXP:

  • An increase in traffic towards CrowdStrike on the day that likely corresponds to the rollout of the update, and 
  • A subsequent decrease in network traffic to the application. The traffic volume in the period from seven to 28 days after the incident was between 28.8% (ISP-2) and 60.5% (IXP-1) lower than the volume from seven to 28 days before. Weekly traffic volumes for ISP-5 and ISP-2 returned to pre-outage levels around six months after the incident.
Time series line graphs showing a decrease in traffic volume to Crowdstrike website after the incident.
Figure 2 — Normalized traffic volume for the CrowdStrike application. We see decreased traffic volume after the incident.

Since the incident affected many dependent services and organizations, we also analyzed select reported applications for their traffic volumes and deviations from the norm.

Figure 3 shows the most significant effect. Here, two affected airlines observed traffic increases shortly after the outage. For Airline-1, this effect is especially prevalent on Friday and Monday. Airline-2 observes a considerable spike in ISP-4 but also shows increased traffic in ISP-1.

Time series line graphs showing disruptions to airline company traffic
Figure 3 — The median normalized traffic is depicted by the blue line, with the red line showing the traffic on the outage week. The median is calculated for the same time of day across 10 weeks before the event. The blue band around the median indicates a 99.7% confidence interval for the period. Bars show the difference between outage week and median, with red (blue) bars indicating less (more) traffic on the outage week.

Figures 4 and 5 also show impacts on other applications like Media and Security.

Time series line graphs showing disruptions to media company traffic
Figure 4 — An affirmatively affected media company sees a 14.0x increase in traffic in ISP-1 (7.4x for ISP-4) starting Friday around 8 a.m. and lasting until 4 p.m. (8 p.m. for ISP-4).
Time series line graphs showing disruptions to cybersecurity company traffic
Figure 5 — We observe collateral damage for multiple cybersecurity companies, Security-1 and Security-2. Traffic stays unusually low after the outage, returning to normal levels only by Monday. This effect may hint at similar customer populations for the affected companies and CrowdStrike.

With systems across the Internet becoming increasingly dependent on each other, a single point of failure can lead to widespread issues, as the CrowdStrike and more recent Google Cloud outages have shown. As such, application-level monitoring and semantically enriched network traces will become increasingly crucial for detecting and analyzing such outages. Read our paper to learn more.

Vaishnavi Raghavajosyula is a PhD student at the Max Planck Institute for Informatics and a 2025 Pulse IPv6 Research Fellow.

The views expressed by the authors of this blog are their own and do not necessarily reflect the views of the Internet Society.


Photo by Smishra1 Via Wikimedia Commons