When DDoS attacks are raging, can DDoS protection still hold back?

Nowadays, the core of DDoS protection in the game industry has begun to rely on money. Through understanding, extortion after DDoS attacks is actually very common in the game industry. From the initial attack on large commercial game servers to the indiscriminate attack on online games developed by small teams, attacks seem to have become commonplace. A more classic case of a DDoS attack in the gaming industry was at the end of 2013. A hacker organization called Lizard Squad launched a series of DDoS attacks on game platforms such as PSN, Xbox Live, EA Origin, Blizzard Battle.net, Steam, etc., resulting in players all over the world being unable to play online games normally during the Christmas holiday, and the impact was very large. Unlike most domestic DDoS attacks after blackmailing, Lizard Squad did not carry out any blackmail, but to show off its "brilliant record" on social platforms, which aroused public outrage from players. Fortunately, the U.S. police were able to make the main members of Lizard Squad arrested and later sentenced to 27 months in prison and compensated for 95,000 US dollars.
A game practitioner X once said that domestic DDoS attacks against games are also very common. The server of their game was attacked, causing at least 200,000 yuan in direct losses. The practitioner revealed that their game server was attacked by traffic from one to nine o'clock in the evening for several days, and did not stop until one or two in the morning. The attack caused the server to hang, the game dropped, and all players were unable to log in. Later, they approached cloud service providers to double the bandwidth and purchased DDoS protection services to solve the DDoS attack. X revealed that the DDoS attacker did not conduct any blackmail this time. "At the beginning, we added bandwidth, carried it over, and then purchased DDoS protection services. These are all money." X concluded that the core of dealing with DDoS is to "finish money" and prevent attacks by spending a lot of money to purchase DDoS protection. However, X said that the encounter he was attacked is nothing more than a "trivial" compared to his friends who play board games. X revealed that chess and card games are being attacked almost every day.
Due to the convergence of gameplay, chess and card games are highly replaceable. If the game is attacked by DDoS and the player cannot log in, it is easy to cause the player to lose other board games. Many chess and card game teams suspect that their peers bought hackers to attack. The harm of DDoS attacks is not only the server downtime, but also may cause cloud service providers to be "closed in a dark room" by the attacker because they fear that the attack will affect other customers in the same computer room. There are also practitioners who suggest that the attacked game manufacturers collect evidence and call the local Internet police to report to the police, but it seems that not many people in the industry take this measure.
DDoS attacks are rampant, but DDoS protection cannot temporarily succumb. With the popularity of SaaS services and high network bandwidth in recent years, some people who do not know much about technology can easily launch DDoS attacks. The cost of the DDoS attacker is lower than that of the defender. Sometimes it only needs to hijack the meat machine through a Trojan horse program to launch an attack. Moreover, the enemy is secretive and difficult to prevent. Experts suggest that game manufacturers should pay attention to the construction of network security at the company level, and should not wait until they are attacked to find solutions. The small team should also be aware of this problem from the beginning. “Now there are many companies that provide security management and services, and you don’t necessarily need to maintain a security team yourself.” It may only be that the relevant national departments increase their efforts to crack down on cyber hacking. It is possible to fundamentally eliminate the chronic disease of DDoS attacks.
This article is reproduced from: http://www.heikesz.com/ddos1/1767.html

Guess you like

Origin blog.csdn.net/weixin_51110871/article/details/111313913