![]() |
|
#1
|
|||
|
![]() Found this today. Haven't thought too muh into it (still half asleep).
Could this possibly work for us? The only issues I see would be possible delays in response time to/from server and client. Again, haven't thought too much into it. Just trying to help as I see how this works well from a website mitigation perspective. http://arstechnica.com/security/2013...mhaus-offline/ http://en.m.wikipedia.org/wiki/Anycast | ||
|
#2
|
|||
|
![]() Sounds expensive to employ any company to help with this.
| ||
|
#3
|
|||
|
![]() DDoS'er will run out of funds at some point... funny how people will burn money on DDoS'ing services. I wonder if he's tweeting live from mom's basement?
__________________
![]() | ||
|
#4
|
||||
|
![]() Quote:
| |||
|
#5
|
|||
|
![]() Why does everyone assume the person behind the ddos is paying for it?
Bad assumption
__________________
hello i'm cucumbers
![]() | ||
|
#7
|
||||
|
![]() Quote:
| |||
|
#8
|
||||
|
![]() Quote:
| |||
|
#9
|
|||
|
![]() Do we know that p1999 is even the target? A DDOS attack could cause congestion on a network segment that just happens to be shared with the true target which effectively denies service to EVERYONE who shares that segment. If it is truely targeted at p1999 servers many times these attacks are sourced from a single (or maybe a few regions) such as China. You could mitigate the effectiveness of the attack by blocking traffic to IP ranges used in these regions. In fact if the server is hosted somewhere I'm sure the staff of the facility would love to help push these DOS traffic out and would love to help.
| ||
|
#10
|
||||
|
![]() Quote:
| |||
|
![]() |
|
|