DDoS Overview

From Nitradopedia EN
Jump to: navigation, search


An attack targeting a computer or server to disable its availability is commonly known as DDoS (distributed Denial of Service).

Nitrado uses hardware to repel this kind of attacks, which identifies and blocks attacks within the shortest time possible without restricting the used services.

Different attack types differentiate DDoS. Below you will find brief explanations of the most common attack types.

CRITICAL NOTICE: Launching a DDoS attacks is illegal (forbidden by law). Even targeting your server is prohibited, because services of other customers, which use the same infrastructure may suffer.

SYN Flood

A SYN flood attack is defined by an attacking computer or server that sends a high count of SYN packets to the target PC with a faked sender IP address. The target server's "Connection Table" overflows because of all the connection requests the server is waiting for due to the SYN packages, which causes "real" connections to be dropped as well.

HTTP Attack

During an HTTP attack, the server receives a high count of HTTP packets. This method causes the server to overload till it's only sporadically or even not reachable. The attack may be performed by a static or changing IP address.

UDP flood

During an HTTP attack, a target server receives a high count of UPD packets. The bare force of this attack overloads the server and blocks other incoming healthy requests from being processed. The attack may be performed by a static or changing IP address. Real IP addresses aren't needed, so the packet header is faked in most cases.

ICMP flood

During an ICMP flood attack, a target server receives a high count of ICMP packets. The bare force of this attack overloads the server and blocks other incoming healthy requests from being processed. The attack may be performed by a static or changing IP address.

Invalid Packets

This type is unwanted traffic that has nothing to do with Gameservers and will be filtered immediately.