A hacker possesses a large network of remotely controlled computers (BOTNET) in order to perform DDoS attack. There is no need to hide IP addresses of these computers1). The hacker can just imitate legit users' activity. However, due to the large number of computers used for the attack (up to hundreds thousands sometimes), this activity overloads the site and leads to the denial of service. Hackers typically employ the heaviest requests to the site under attack. This reduces the number of computers used for the attack. The IP addresses of these computers will be known after the attack.
Various behavioural strategies are used to protect against these attacks. These approaches allow to detect abnormal behaviour and may be more or less effective. We offer a simple and reliable approach: use a CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) page. This test allows to define if the user is a human.
The protection works as follows: