![]() ![]() Once the customer access the website, the request is routed to a load balancer that distributes traffic between 2 EC2 instances.Ī DDoS attack usually starts with your website becoming unavailable to all of your users. Both its PHP backend and NuxtJS frontend applications are hosted in EC2. Let's start with this typical network architecture. We will focus on application layer attacks for this article. There are 3 types of DDoS attacks: Application Layer, Protocol Attacks, and Volumetric attacks. This results in downtime, and with your website down, your customer won't be able to buy anything, and your revenue grounds to a halt. They aim to overwhelm your servers with so much fake traffic that your legitimate end-users won't be able to access your application. While this is by no means a comprehensive guide, it will give you the tools necessary to respond to a DDoS attack.Īt its core, DDoS attacks are denial-of-service attacks. I created this field guide for developers so I can save all of you the firefighting and research I had to do on the fly during those 3 days. But those 3 days were the most stressful times of my year (so far). Luckily, we were able to respond promptly and we stopped the DDoS attack within 3 days. For context, our website usually just receives 30,000 requests per minute. One of our customer-facing websites got attacked with a huge DDoS attack recently, to the magnitude of 80M-100M requests per hour. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |