Incident ResponseIntermediate35 min read

DDoS Attack Mitigation

Technical guide to detecting, mitigating, and recovering from Distributed Denial of Service attacks including response playbooks, architectural hardening, and prevention strategies.

SBK Security Team
Incident Response Practice
Updated December 2024

Understanding DDoS Attacks#

Distributed Denial of Service (DDoS) can cripple your online services within minutes—understanding attack types and having prepared responses is critical for business continuity.

Detail Level

This guide covers DDoS fundamentals: attack types, detection methods, mitigation strategies, response playbooks, and architectural hardening to improve resilience.

Attack Detection#

Early detection enables faster response. Establish baselines and monitor for anomalies that indicate DDoS activity.

1

Baseline Establishment

Document normal traffic patterns: bandwidth usage, request rates, geographic distribution, protocol mix. Baselines enable anomaly detection. Update baselines for seasonal variations.

2

Real-Time Monitoring

Monitor traffic continuously: inbound bandwidth, packets per second, connection rates, error rates. Use network monitoring tools and SIEM for correlation.

3

Anomaly Detection

Configure alerts for baseline deviations: sudden traffic spikes, unusual protocols, geographic anomalies, connection exhaustion. Balance sensitivity to minimize false positives.

4

Attack Classification

When attack detected: identify attack type (volumetric, protocol, application), source distribution, target resources. Classification guides mitigation strategy selection.

False Positive Management

Legitimate traffic spikes (flash crowds, marketing campaigns) can resemble attacks. Coordinate with business teams on expected traffic events. Implement graduated response rather than blocking immediately.

Mitigation Strategies#

Effective DDoS mitigation requires layered defenses. No single solution handles all attack types and volumes.

Detail Level

On-Premise Defenses:

  • Rate limiting at firewall and load balancer
  • SYN cookies for SYN flood protection
  • Connection limits per source IP
  • Blackholing obvious attack sources
💡

Layered Defense

Combine multiple mitigation layers: CDN for edge protection, WAF for application layer, rate limiting at origin, ISP null-routing as last resort. Test mitigation paths before you need them.

Response Playbook#

When attacks occur, follow prepared response procedures. Document playbooks before incidents to ensure consistent, rapid response.

1

Detection and Triage

Confirm attack in progress. Classify attack type and severity. Notify incident response team. Begin logging attack characteristics. Initial assessment within 5 minutes.

2

Escalation

Notify stakeholders based on severity. Engage DDoS mitigation provider if using scrubbing service. Alert ISP for large volumetric attacks. Activate crisis communication plan.

3

Mitigation Activation

Implement mitigation based on attack type. Activate CDN protections. Enable rate limiting. Divert traffic to scrubbing if needed. Monitor effectiveness and adjust.

4

Communication

Update status page for external communication. Notify affected customers. Internal updates to leadership. Document timeline for post-incident review.

5

Recovery and Review

Confirm attack has subsided. Gradually restore normal operations. Remove temporary mitigations carefully. Conduct post-incident review within 72 hours.

Detail Level

Key Contacts to Pre-Establish:

  • DDoS mitigation provider emergency line
  • ISP/hosting provider NOC contacts
  • CDN provider support escalation
  • Internal incident response team
⚠️

Communication Timing

Don't announce attacks publicly until mitigation is effective. Attackers monitor target communications. Internal coordination first, then customer notification once you have a recovery timeline.

Architectural Prevention#

Design infrastructure to withstand attacks. Architectural hardening reduces attack impact and improves recovery speed.

1

Capacity Planning

Provision excess capacity for traffic spikes. Plan for 3-5x normal peak traffic. Include burst capacity in cloud contracts. Test capacity limits before attacks reveal them.

2

Network Hardening

Implement ingress filtering (BCP38). Configure TCP stack for resilience. Tune connection timeouts. Block unnecessary protocols. Implement rate limiting at network edge.

3

Application Hardening

Optimize application for high request rates. Implement caching aggressively. Use connection pooling. Design APIs to handle graceful degradation under load.

4

Testing and Validation

Conduct regular DDoS simulations. Test mitigation activation procedures. Validate failover mechanisms. Document lessons learned and update architecture.

Origin Protection

If attackers discover your origin IP, they can bypass CDN protection. Change origin IPs periodically. Use IP whitelisting so origin only accepts traffic from CDN. Monitor for origin exposure.

References and Resources#

Additional resources for DDoS mitigation planning and implementation.

Detail Level

Cloud Provider Documentation:

  • AWS Shield Developer Guide
  • Azure DDoS Protection Standard Documentation
  • Google Cloud Armor Documentation

Expert Assistance

Our incident response team helps organizations prepare for and respond to DDoS attacks. We provide architecture review, playbook development, and mitigation testing. Contact us for a resilience assessment.
ddosincident-responseavailabilityinfrastructureresilience
All Guides