This seems just a generic question that can be answered by your system
administrator / network admin...
First thing I would do if I was in them would be moving the servers to
linux and host them there... then run tcpdump ... check for the content,
buy additional uplinks, bond them, and filter the attack using iptables :)
On Mon, Oct 21, 2013 at 9:53 PM, Jermin Hu jermin...@espc.asia wrote:
We are a esports portal site in China. Our CS:GO tournament kicked off
today.
But during some of today’s matches, our CS:GO server was under UDP
flooding attack. The attacker used port 27005 to send massive packets to
our server port. Then the ping of our server went as high as 700s, which
rendered the match unable to continue.
I managed to capture some attacking packets with Microsoft Network
Monitor. But I was not able to decode them. They are displayed in HEX
format with unreadable codes. How can I know what they are sending?
And more importantly, how can I stop such kind of attacks?
Best regards,
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers
___
Csgo_servers mailing list
Csgo_servers@list.valvesoftware.com
https://list.valvesoftware.com/cgi-bin/mailman/listinfo/csgo_servers