Protection against UDP flood attack [Документация VAS Experts]

Protection against UDP flood attack

This attack is handled by fragmented UDP packets. The target system has to spend a lot of resources to assemble and analyse them.

The protection is carried out by disabling of unnecessary protocols on the site under protection. You can learn how to configure the protocol's filter here: configuring priorities.

For a typical WEB site under protection, the required protocols are HTTP and HTTPS. Therefore the proper configuration looks like this:

http        cs0
https       cs0
default     drop

To convert the ready configuration file into the internal format and to send it to DPI:

cat my_dscp.txt|lst2dscp protocols.dscp
mv protocols.dscp  /etc/dpi/protocols.dscp
service fastdpi reload

The protection against DDos attack of DNS/NTP amplification type can be arranged similarly. This attack overloads the incoming channel by the traffic that exceeds the channel's capabilities. The operation of this protection is limited by operator's ability to provide additional channel capacity. If the inbound traffic exceeds this capacity, one has to rent additional channels or redirect the traffic to dedicated services that provide a protection against such attacks. They rent very wide channels to exceed the capabilities of DDoS attacks.