PSN, Battlenet, Riot, and others DDOSed; PSN returning lightly toasted with butter

rrc1594.gif


Saw this, found it slightly amusing
 
enlighten us

and the rest of the world

master internet engineer gogogow

Wellwe'rewaiting.gif

Also yes gif. None of this jif nonsense.

Gotta love them anti-DDoS toasters.

Guns is what I'm getting from this post.

Don't you guys have google or something?

DDoS Mitigation
Given the growing number and scale of DDoS attacks, planning for DDoS attack detection and mitigation is a critical IT function. Since it's virtually impossible to build out sufficient infrastructure to scale in response to a large DDoS attack, solutions like Akamai's Kona Site Defender are increasingly being deployed by owners of Web properties across virtually every industry. Cloud-based solutions like Kona Site Defender offer built-in scalability and global reach to defend against most common types of DDoS attacks, as well as attacks against web applications (SQL Injections, Cross Site Scripts, etc.) and direct-to-origin attacks.

How Kona Site Defender Blocks DDoS Attacks
Kona Site Defender mitigates DDoS attacks by absorbing DDoS traffic targeted at the application layer, deflecting all DDoS traffic targeted at the network layer such as SYN Floods or UDP Floods, and authenticating valid traffic at the network edge. This built-in protection is "always on", and only Port 80 (HTTP) or Port 443 (HTTPS) traffic is allowed. Bursting fees can be capped so users are protected from DDoS traffic running up service fees, and flexible caching maximizes offload from origin.
For added protection, many organizations add a defense layer that protects the Domain Name Server from being overloaded and compromised by Denial of Service attacks, such as Akamai's eDNS solution. Both of these solutions leverage the power of the Akamai Intelligent PlatformTM, which consists of more than 100,000 servers deployed across over 1,000 networks in more than 70 countries.

* Specialized On-Premises Equipment. This is similar to “Do It Yourself” in that an enterprise is doing all the work to stop the attack, but instead of relying on scripts or an existing firewall, they purchase and deploy dedicated DDoS mitigation appliances. These are specialized hardware that sit in an enterprise’s data center in front of the normal servers and routers and are specifically built to detect and filter the malicious traffic. However, there are some fundamental problems with these devices:

• They are costly CAPEX purchases that may sit around and do nothing until you get attacked. They also can be expensive to operate. You need skilled network and security engineers to work these devices - there is no magic “mitigate DDoS” button.

• They must be constantly updated by the operations team to keep up to date with the latest threats. DDoS tactics change almost daily. Your team must be prepared to update these devices to the latest threats.

• They can’t handle volumetric attacks. It’s unlikely that an enterprise would have enough bandwidth coming in to handle the very large DDoS attacks occurring today. These hardware appliances don’t do any good when the attack exceeds network capacity.

* Internet Service Provider (ISP). Some enterprises use their ISP to provide DDoS mitigation. These ISP’s have more bandwidth than an enterprise would, which can help with the large volumetric attacks, but there are three key problems with these services as well:

• Lack of core competency: ISP’s are in the business of selling bandwidth and don’t always invest in the required capital and resources to stay ahead of the latest DDoS threats. It can become a cost center to them - something they have to provide, so they do it as cheaply as possible.
Resources


• Single provider protection: Most enterprises today are multi-homed across two or more network providers to remove the single point of failure of a provider. Having two providers is a best practice to maximize uptime. ISP DDoS mitigation solutions only protect their network links, not the other links you might have, so now you need DDoS mitigation services from different providers, doubling your cost.

• No cloud protection: Similar to the above, a lot of Web applications these days are split between enterprise-owned data centers, and cloud services like Amazon AWS, GoGrid, Rackspace, etc. ISP’s can’t protect traffic on these cloud services.

* Cloud Mitigation Provider. Cloud mitigation providers are experts at providing DDoS mitigation from the cloud. This means they have built out massive amounts of network bandwidth and DDoS mitigation capacity at multiple sites around the Internet that can take in any type of network traffic, whether you use multiple ISP’s, your own data center or any number of cloud providers. They can scrub the traffic for you and only send “clean” traffic to your data center.

Cloud mitigation providers have the following benefits:

• Expertise: Generally, these providers have network and security engineers and researchers who are monitoring for the latest DDoS tactics to better protect their customers.

• Lots of bandwidth: These providers have much more bandwidth than an enterprise could provision on its own to stop the biggest volumetric attacks.

• Multiple types of DDoS mitigation hardware: DDoS attacks are extremely complex. There is a need for multiple layers of filtering to be able to keep up with the latest threats. Cloud providers should take advantage of multiple technologies, both commercial off the shelf (COTS) and their own proprietary technology to defend against attacks

Cloud mitigation providers are the logical choice for enterprises for their DDoS protection needs. They are the most cost effective and scalable solution to keep up with the rapid advances in DDoS attacker tools and techniques.
 
enlighten us

and the rest of the world

master internet engineer gogogow

Depending on what is being overloaded .. it could be CPU (if the packets need to be punted to the CPU), or the bandwidth of the internet facing links (lets say Sony have 1GB internet circuit x 10)

edit: You could do two things to lower the impact of the DDOS, e.g. you can preserve 10% of your bandwidth so that the network engineer and still keep the system running using QOS / Policing.

If you setup Blackhole routers, that can redirect the malicious traffic into routers which just dump the packets into a router that goes nowhere, saving some network resource.

Can't stop it though, unless you have the bandwidth to take in all that traffic, and have network devices that process via hardware asics.
 
Is there like someone standing behind some posters with a gun to their heads saying POST ABOUT NETWORK SECURITY OR I WILL SHOOT YOU

lol
 
You going to reply to the guy who proved you said sony was hacked, or just going to keep ignoring it and acting like you didnt just google DDoS after being called out on it?

I never said Sony was hacked. They were hacked in 2011. And no I didn't google ddos. I did google about ddos protection and defending from them.
 
Why doubt him? These people crave attention so if it's not him then he's really on point taking credit for everything with exposing the Lizards and then making his video on YT and everything. If it's not him or he's not involved at all then you'd think the person actually doing it would step up and do the same thing Fame did to the Lizards.

People, me included, have noticed some slow downs and disconnects on XBL but for the post part it's up and running as usual. Are we supposed to be naive enough to think it's just a coincidence and not just a failed attempt at the same thing when the guy said he was going to try? Why would MS be left alone when a bunch of other companies in the industry are getting hit by it?
I doubt him because its so easy to do talk like this. For example, have anyone verified that the IPs he posted earlier are the actual IPs of those lizard guys? Its possible that he is the one doing the DDOS attack, that i can believe, but i have big doubts about anything else of the technical stuff that hes saying.

That said, i dont know how the DDOS attacks are affecting PSN and Xbox Live differently, so i cant really give any good answer to that unfortuantely.
 
I can't even enter my profile on my ps4 now. The console just freezes.

I can bypass it by entering as a guest then switching user.

I'll turn off network connect. Maybe that will help.

Have no idea if this issue is causing my problem. Just that it's started after all this happened.
 
Fuck. What's a google?

Someone should tweet yosp and let him know about this revolutionary tool.

Read earlier that SOE already uses Akamai, so they had protection. It's just not enough at some point. It's impossible to completely handle a DDOS unless you actually have the bandwidth.
 
I never said Sony was hacked. They were hacked in 2011. And no I didn't google ddos. I did google about ddos protection and defending from them.

And now you are an expert and have an insight into Sony's network and security implementation.
 
Wow, seems Sony didn't learn shit since the 2011 PSN hack. Fucking pathetic. A lot of people saying how these hackers are amateurs, but yet they crippled the entire PSN servers for at least a day, really shows how Sony didn't do squat to upgrade and protect their servers for amateuristic ddos attacks.

What some people? Sony got hacked to hell in 2011 and got personal information from 77 million accounts stolen and yet their servers are still so easy to get crippled. I don't give a shit about the video, what I do know is that I can't sign-in into PSN and play the games I want to play for an entire day. The fact that other sites got easily hacked too doesn't mean it's okay for Sony's to be slacking with their servers. Some people...

You are trying way too hard. Microsoft has a wide reaching server business that can offload traffic to limit the affects of DDoS attacks. Sony is not in the server farm business they have fewer available servers to handle traffic. This has nothing to do with security it has to do with brute force traffic spams. So how about you just stop using something you clearly have no clue about to claim "LOL SONY HAZ NO SECURITIEZ LOLOLOLOL."
 
Top Bottom