Post by account_disabled on Mar 14, 2024 9:41:07 GMT 1
Typical for hosting several routers a stack of stretched VLANs three transits and a couple of exchangers. In the hosting business the volume of channels is calculated from the volume of total traffic on the network plus a reserve in case of accidents and attacks usually not exceeding x the traffic in the CHN. From here the protection of the infrastructure and clients is built the maximum expected total attack power is assessed a small margin is taken and countermeasures are selected so as to protect an individual client without falling down. It is important to understand that any typical hosting is under DDoS attack almost.
At least one client is under attack at any given time. Therefore DDoS for us is even somewhat banal. Over Buy Email List years we have seen a lot of things and in principle we know the key and not only patterns where what where and how. Good evening On September closer to we were hit by another DDoS which we know what to do with. They recaptured and went to rest. And before I had time to finish my tea the attack was repeated then again and then again. Each time the interval decreased and the volume increased. Screenshot from StormWall at that moment Next for those who like a brief summary.
I will list the causeandeffect relationship that arose in the infrastructure. More is poured into are overloaded until signaling is lost we block the attack via OOB via RTBHFS or switch the network to a thirdparty traffic cleaning center the target of the attack changes within five minutes. Among the additional problems in St. Petersburg uplinks are connected through switches with oversubscription QOS either does not work or there is not enough buffer the signaling falls apart. Additionally there are huge stretched VLANs which means that an attack on one subnet will affect a huge number of clients.
At least one client is under attack at any given time. Therefore DDoS for us is even somewhat banal. Over Buy Email List years we have seen a lot of things and in principle we know the key and not only patterns where what where and how. Good evening On September closer to we were hit by another DDoS which we know what to do with. They recaptured and went to rest. And before I had time to finish my tea the attack was repeated then again and then again. Each time the interval decreased and the volume increased. Screenshot from StormWall at that moment Next for those who like a brief summary.
I will list the causeandeffect relationship that arose in the infrastructure. More is poured into are overloaded until signaling is lost we block the attack via OOB via RTBHFS or switch the network to a thirdparty traffic cleaning center the target of the attack changes within five minutes. Among the additional problems in St. Petersburg uplinks are connected through switches with oversubscription QOS either does not work or there is not enough buffer the signaling falls apart. Additionally there are huge stretched VLANs which means that an attack on one subnet will affect a huge number of clients.