This seems just a generic question that can be answered by your system
administrator / network admin...

First thing I would do if I was in them would be moving the servers to
linux and host them there... then run tcpdump ... check for the content,
buy additional uplinks, bond them, and filter the attack using iptables :)


On Mon, Oct 21, 2013 at 9:53 PM, Jermin Hu <[email protected]> wrote:

>   We are a esports portal site in China. Our CS:GO tournament kicked off
> today.
>
> But during some of today’s matches, our CS:GO server was under UDP
> flooding attack. The attacker used port 27005 to send massive packets to
> our server port. Then the ping of our server went as high as 700s, which
> rendered the match unable to continue.
>
> I managed to capture some attacking packets with Microsoft Network
> Monitor. But I was not able to decode them. They are displayed in HEX
> format with unreadable codes. How can I know what they are sending?
>
> And more importantly, how can I stop such kind of attacks?
>
> Best regards,
>
> _______________________________________________
> Csgo_servers mailing list
> [email protected]
> https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
>
_______________________________________________
Csgo_servers mailing list
[email protected]
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers

Reply via email to