![]() ![]() They aim to overwhelm your servers with so much fake traffic that your legitimate end-users won't be able to access your application. While this is by no means a comprehensive guide, it will give you the tools necessary to respond to a DDoS attack.Īt its core, DDoS attacks are denial-of-service attacks. I created this field guide for developers so I can save all of you the firefighting and research I had to do on the fly during those 3 days. But those 3 days were the most stressful times of my year (so far). Luckily, we were able to respond promptly and we stopped the DDoS attack within 3 days. For context, our website usually just receives 30,000 requests per minute. ![]() ![]() One of our customer-facing websites got attacked with a huge DDoS attack recently, to the magnitude of 80M-100M requests per hour. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |