Monday, 14 May 2018

New top story on Hacker News: Ask HN: How is DDoS protection implemented?

Ask HN: How is DDoS protection implemented?
171 by elephant0xffff | 46 comments on Hacker News.
The big services (Google, Cloudflare, etc.) provide DDoS attack mitigation (and seem to succeed), but details on their tactics are rare (at least I did not find in-depth information on that). I guess to make this work well you have to do classification (regular request vs. malicious) on several protocol layers and then reroute or drop packets accordingly. But how does that prevent severe service degradation - you still have to do some kind of work (in computation and energy) on the listening side or can fat edge-servers just eat that up?

Previous Post
Next Post

post written by:

Related Posts

0 comments: