New top story on Hacker News: Ask HN: How is DDoS protection implemented?

Ask HN: How is DDoS protection implemented?
2 by elephant0xffff | 0 comments on Hackshub
The big services (Google, Cloudflare, etc.) provide DDoS attack mitigation (and seem to succeed), but details on their tactics are rare (at least I did not find in-depth information on that). I guess to make this work well you have to do classification (regular request vs. malicious) on several protocol layers and then reroute or drop packets accordingly. But how does that prevent severe service degradation - you still have to do some kind of work (in computation and energy) on the listening side or can fat edge-servers just eat that up?

Comments

Popular posts from this blog