Thoughts on preventing DDOS

Thoughts on preventing DDOS

in Account & Technical Support

Posted by: Spartyr.6795

Spartyr.6795

This is really for fellow techies and not necessarily a help seeking topic. I’m just kind of brainstorming so if it’s in the wrong section I apologize, but it felt appropriate.

What if the game client had an optional input field for entering a secure token? The token is just a string, a random series of characters, and this token would be unique to a user and emailed to each user during a DDOS attack.

By default this field would not be required, but in the event of a large scale attack, it would be flagged on. A different server would handle all requests and check if this token exists, and do the database lookup to match the unique token to an active user account.

Any attempt to connect to the game that did not result in a token match would not even be handled by the auth server, those that did match get forwarded on.

You could even change the name of the input field occasionally when the client updates to make it harder to spoof, and limit the database lookups on your token server.

Anyone have any thoughts on if this would work?

Spartyr – Norn Thief
[GSCH] Gaiscioch Gaming Community

(edited by Spartyr.6795)

Thoughts on preventing DDOS

in Account & Technical Support

Posted by: mtpelion.4562

mtpelion.4562

That would only help with server traffic load, not with bandwidth load.

So yes, it would work, but not against all problems caused by DDoS attacks.

Server: Devona’s Rest

Thoughts on preventing DDOS

in Account & Technical Support

Posted by: Spartyr.6795

Spartyr.6795

Yeah that’s a good point. Do you know how far up the pipe filtering would have to happen for bandwidth to not be an issue?

Like if you filtered traffic at the gateway of the datacenter is that enough, or would the ISP need to be involved, or does it go all the way back to a major backbone provider?

Spartyr – Norn Thief
[GSCH] Gaiscioch Gaming Community

Thoughts on preventing DDOS

in Account & Technical Support

Posted by: mtpelion.4562

mtpelion.4562

Yeah that’s a good point. Do you know how far up the pipe filtering would have to happen for bandwidth to not be an issue?

Like if you filtered traffic at the gateway of the datacenter is that enough, or would the ISP need to be involved, or does it go all the way back to a major backbone provider?

Typically, your backbone is going to have a high enough bandwidth (or at least enough alternate paths) to handle DDoS traffic. Everything else could potentially be at risk depending on the size of the zombie net.

Server: Devona’s Rest

Thoughts on preventing DDOS

in Account & Technical Support

Posted by: Stormcrow.7513

Stormcrow.7513

What about the token idea including login mirrors?
The mirrors could dissipate bandwidth bottlenecking?

i7 3770k oc 4.5 H100i(push/pull) 8gb Corsair Dominator Asus P877V-LK
intel 335 180gb/intel 320 160gb WD 3TB Gigabyte GTX G1 970 XFX XXX750W HAF 932

Thoughts on preventing DDOS

in Account & Technical Support

Posted by: ikereid.4637

ikereid.4637

DoS attacks are service interruptions. There are only 2 ways to control and prevent DoS attacks.

1. Have an IPS/IDS that proxy syns the attacks to a faster Internet Pipe (a 400Gbps DoS attack would have to be proxied to a 600Gbps pipe to make the originating pipe function properly). Currently only a few IPS’s do this, Juniper IDP and TippingPoint IPS. And these devices cost hundreds of thousands to install/configure and implement. AND you still need the additional offload pipe to make it work (BW is cheap but not free)

2. Digest the target attack, and load balance your TCP Sessions based on the source of that attack. This would require multiple datacenters across the world, all interlinked on 6+ ISP’s each and load balance all traffic accordingly. Basically, have more BW then any given attacker can source with. That way when an attack happens, and one of your transports is affected, you can change your BGP data to load balance away your servers connections from that transport.

Other then that, nothing else would work. that is how these types of attacks work. Its a flood of data that requires not ack for it to continue.

Desktop: 4790k@4.6ghz-1.25v, AMD 295×2, 32GB 1866CL10 RAM, 850Evo 500GB SSD
Laptop: M6600 – 2720QM, AMD HD6970M, 32GB 1600CL9 RAM, Arc100 480GB SSD