As you know, DoS does not attack a vulnerability or a hole in a system, it simply stresses the system to the limit that it can not handle any more traffic, so it either crashes or gets overwhelmed that innocent traffic simply get droped.
What makes this more difficult is that it is relatively easy to FORGE the SOURCE ip address of the attacking packets, making those packets practically untraceable to the REAL source, except with much deeper forensics measures that involve human and 3rd party resources.
Probably the best way (which is not always possible) is to stop the offending traffic at it's source where it originates. But this can involve changing ISP or company policies that might exist in different parts of the world that are in no way under our control.
In this case should organizations always have a redundant ISP connections so that they can quickly swap connections.
DDOS is the atomic bomb of the Internet world or rather the HIV of the Internet world.
It either choke your bandwidth or overwhelm your system unit. In a scenario of DDOS attack organizations double their bandwidth or use their ISPs to filter traffic. But I think operating system programmers have a lot to do in terms of how OS handle queries.
If both of the internet connections are actively used, DNS Load balancing for example, they will most likely both get crashed. Chances are smaller because of the higher bandwith, but considered todays ddos attacks being 60 to 300+ Gbit/s traffic it wont change anything in nearly all cases.
If the second connection is only used as a kinda "spare" connection as u said, the core problem still remains: Your systems crashes or drops everything. After all someone has to react and check/repair either way.
There are also proxy solutions with high bandwith availabillity, where the traffic is checked and then forwarded. The advantage is your infrastructure wont get hurt, and small attacks can be withstood. But the same problem as above stays, if the proxy gets crashed due to the traffic ur still ****** and have to react. Or in better words the company you pay for the proxy has to react.
after all, there will never be a 100% effective way to deal with it.
the dreams of yesterday are the hopes of today and the reality of tomorrow.
-Robert H. Goddard
Re: Internet slows down after DoS attack using DNS
6 years 2 months ago #38305