DDoS Protection

Learn how edge computing prevents Denial of Service attacks on your game servers.

Server outages can easily ruin player experience and seriously harm your game's and studio's reputation. Aside from dev team accidents, provider outages, or localized ISP issues, malicious Denial of Service attacks are amongst the top threats that every studio has to keep in mind.

Malicious parties attacking your infrastructure often try to flood your network with requests to a point of saturation where legitimate user's network packets can no longer reach your services, or are severely impacted in response times and availability.

To mitigate and recover from DDoS attacks automatically:

  1. We detect all the usual attack vectors early - TCP SYN floods, UDP floods, and HTTP floods.

    1. Metrics include Port Connection Rate, Source Connection Rate, Total Connection Rate.

  2. We declare the machine Under DoS and steer Deployments away from the targeted site.

  3. To reduce impact on running games we perform upstream scrubbing, and inject routing/firewall policies locally at the edge, adding a null route redirect for suspicious incoming traffic.

    1. Due to traffic filtering at the edge, the wasted upstream bandwidth from server is minimal.

  4. Once players conclude their match on the targeted site and disconnect, we recycle the site's IP address to ensure subsequent matches will not be targeted by the same attacker.

    1. New matches will use a fresh server IP address and port assigned randomly.

If you have particular questions or concerns don't hesitate to contact us over our Community Discord.

Last updated

Was this helpful?