Providers that protect against DDoS attacks
Shielded

Lead Image © Igor Stevanovic, 123RF.com
To ward off DDoS attacks, websites and services often seek the protection of Internet giants, such as Amazon, but you have other ways to protect your connectivity.
Distributed Denial of Service (DDoS) attacks are a plague with consequences just as horrific as ransomware attacks. As a blackmail scheme, a targeted attack, or a form of virtual vandalism, a swarm of attackers floods a website with an influx of requests in an attempt to shut it down. In the past, attackers often used reflection attacks, which involve an attacker sending several packets with the IP address of the victim as the sender to servers, which then acknowledge the requests with long answers. Because of the spoofed IP address, however, these massive responses go to the victim's address.
Even companies with Internet connectivity in the 10 to 40Gbps range can be powerless against attacks with several hundreds of gigabits per second bandwidth. An Internet search with the keywords "biggest DDoS" regularly shows new and increasing values for such attacks; the peak is currently around 1Tbps. With the Internet of Things, attackers can now choose platforms that are much easier to use; for example, hacked surveillance cameras, refrigerators, and cheap routers have been responsible for recent attacks. In this article, I look at methods, providers, and the costs of protecting your connectivity.
The DDoS Family
Roughly three categories of DDoS attacks can be distinguished. Flooding, as the method described above is known, occurs when a large group of computers send many large data packets to a victim, exhausting the bandwidth or loading the infrastructure to its full capacity from the excessive number of individual packets.
In a state exhaustion attack, firewalls or load balancers maintain a state for each connection and enter these states simultaneously in a table. Keeping many connection attempts open will quickly fill this table; Linux acknowledges full tables with the message nf_conntrack: table full, dropping packet. If a customer tries to access your website at this stage, their request is rejected. I am aware of cases in which an attack with a bandwidth of 2Mbps was enough to take down a network behind a firewall. SYN flooding does the same thing with the kernel's TCP connection table. In the course of the three-way handshake when establishing a connection, the attacker only sends the first packet, which means an entry has been created for the connection. Once the table is full, any subsequent connection attempts receive a Connection Refused response.
Finally, in sophisticated attacks against vulnerabilities in applications, attackers often don't even need the first D in DDoS. As a penetration tester, I once encountered a search function in a web portal that was implemented in Java and launched a gigabyte-scale subthread for each search. A script with 10 queries per second paralyzed the entire platform.
Building Floodwalls
The firewall is regarded as a standard tool in network defense. However, because it only uses the data of a single package as a criterion for allowing or rejecting connections – not the quantity and volume of packets – the firewall is easily negotiated. Better firewalls (as in the Linux kernel) provide features for controlling the bandwidth per connection, but the CPU handles these and not the network hardware.
A separate class of devices filters like a firewall, but as a function of the quantity of packets (total and per connection). Dedicated application-specific integrated circuits (ASICs) or field-programmable gate arrays (FPGAs) define rules in the hardware, but the devices are quite expensive. If you want to intercept attacks of 150Gbps, you are looking at a six-figure sum.
Unfortunately these approaches are of little help if the defender of the network is sitting at the narrow end of the pipe. Before the device starts to filter, the pipe is already blocked. Although the measures protect the infrastructure, neither the internal network nor the company website can be reached from outside.
Basically, the defense must be implemented in two steps: First, you need to identify an attack as such; second, you need to divert the attack traffic. You can detect attacks by reference to various parameters:
- The quantity and size of packets per source and target port or IP address.
- The quantity and size of packets within a single connection; because a connection usually comprises just one request and one response packet, 20 request packages are already suspicious.
- The totals of these data.
Collecting Data
Only a few protocols and applications follow static rules. If up to 100 requests per hour is usually normal in a web store, that number might multiply quickly in the pre-Christmas period or during marketing campaigns. Regular shifts in values according to the time of day or day of week are also common. Statistics programs can discover what is normal and plot it against a timeline. If deviations from the norm then emerge, they can be classified as an attack.
Two approaches allow for collecting traffic data: (1) Installing a device inline (i.e., using two cables) that acts as a bridge between the inside and outside. The device then records all data in promiscuous mode and thus collects statistics. (2) Connecting such a device to the mirror port of a switch so that a failure does not interrupt the connection.
Another option is to use NetFlow [1], sFlow [2], or Ipfix (Internet Protocol flow information export) [3]. These protocols provide the sought-after connection data (with different levels of detail). Network components such as routers or switches send statistics to a receiver, which then carries out the statistical analysis and alerting.
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

News
-
First Release Candidate for Linux Kernel 6.14 Now Available
Linus Torvalds has officially released the first release candidate for kernel 6.14 and it includes over 500,000 lines of modified code, making for a small release.
-
System76 Refreshes Meerkat Mini PC
If you're looking for a small form factor PC powered by Linux, System76 has exactly what you need in the Meerkat mini PC.
-
Gnome 48 Alpha Ready for Testing
The latest Gnome desktop alpha is now available with plenty of new features and improvements.
-
Wine 10 Includes Plenty to Excite Users
With its latest release, Wine has the usual crop of bug fixes and improvements, along with some exciting new features.
-
Linux Kernel 6.13 Offers Improvements for AMD/Apple Users
The latest Linux kernel is now available, and it includes plenty of improvements, especially for those who use AMD or Apple-based systems.
-
Gnome 48 Debuts New Audio Player
To date, the audio player found within the Gnome desktop has been meh at best, but with the upcoming release that all changes.
-
Plasma 6.3 Ready for Public Beta Testing
Plasma 6.3 will ship with KDE Gear 24.12.1 and KDE Frameworks 6.10, along with some new and exciting features.
-
Budgie 10.10 Scheduled for Q1 2025 with a Surprising Desktop Update
If Budgie is your desktop environment of choice, 2025 is going to be a great year for you.
-
Firefox 134 Offers Improvements for Linux Version
Fans of Linux and Firefox rejoice, as there's a new version available that includes some handy updates.
-
Serpent OS Arrives with a New Alpha Release
After months of silence, Ikey Doherty has released a new alpha for his Serpent OS.