• 3 Posts
  • 322 Comments
Joined 3 years ago
cake
Cake day: June 23rd, 2023

help-circle
  • CDN & security companies like Akamai actually have data centers designed to intercept and “scrub” DDoS traffic. Akamai has a few dozen of them around the world. From their website:

    Prolexic is the industry pioneer in cloud-based DDoS protection. Network traffic is directed in one of two ways via a border gateway protocol route advertisement change or DNS redirection (A record or CNAME record). Available as an always-on or on demand service, Prolexic offers flexible integration models based on the needs of a customer’s desired security posture across hybrid origins. With global high-capacity scrubbing centers in 32 metro locations, Prolexic can stop attacks closer to the source to maximize performance for users and maintain network resiliency through cloud distribution. Traffic is routed via anycast through the closest scrubbing center, at which the Akamai SOCC deploys proactive and/or custom mitigation controls designed to stop attacks instantly — ensuring fast and accurate DDoS defenses. Clean traffic is then returned to the customer origin via Generic Routing Encapsulation (GRE) tunnels, Layer 2 VLAN connections, and/or VIP-to-origin back-end mapping.












  • You would do well to go read up on the 1990 AT&T long distance network collapse. A single line of changed code, rolled out months earlier, ultimately triggered what you might call these days a DDoS attack that took down all 114 long distance telephone switches in their global network. Over 50 million long distance calls were blocked in the 9 hours it took them to identify the cause and roll out a fix.

    AT&T prided itself on the thoroughness of their testing & rollout strategy for any code changes. The bug that took them down was both timing-dependent and load-dependent, making it extremely difficult to test for, and required fairly specific real world conditions to trigger. That’s how it went unnoticed for months before it triggered.