Radware’s ERT Mitigated a Spoofed-IPs Attack of Several Hundred Gbps



Starting on April 1st, one of the most popular gaming operators from a large Asia-Pacific (APAC) country has suffered DDoS attacks, rendering the application unreachable and many gamers frustrated. It was a massive spoofed-IPs attack against the user authentication ports. After several attempts to mitigate the attack, the customer turned to a local cloud provider – who is a Radware partner – for help. As one the largest providers in APAC they took a stab at fighting the attack off, and called Radware to the battlefield.

This was sophisticated combat, as it turned out. The customer has experienced multi-vector attacks in varying rates and random bursts of hundreds of Gbps each peak. The vector blend was changing and it was clear that the attackers are not only determined to knock the service offline, but keep it down as well.

Figure 1 – Traffic rates throughout the attack campaign
Figure 2 – Traffic rates throughout the attack campaign

We gathered our Emergency Response Team (ERT) DDoS mitigation experts for a round-the-clock fight. This type of attack highlights the need to have experts on call in the moment of truth. The experience of a senior engineer pays off.

Attack Characteristics – Why Spoofed IPs?

The attackers launched a sustained series of precise and high volume floods comprised of the following characteristics:

  1. Professional – neither a novice hacker nor a plug-n-play DDoS-as-a-Service program carried out this attack campaign. The determination and methodic development of the campaign proved it to be a job done by networking experts.
  2. Multiple, constantly changing vectors – including SYN floods, ACK floods, UDP floods, TCP reset attacks and fragmented UDP floods on multiple ports simultaneously, in different blend compositions.
  3. Geographic distribution – to bypass any geo-location based protection
  4. Bursts – A sustained high volume attack combined with high volume peaks every 5 to 15 minutes.
  5. Spoofed IPs – Most DDoS protection solutions use IP blacklisting mechanisms and cannot withstand a dynamic spoofed IPs attack. Not only these are limited by the capacity to store lists of IP addresses, in the case of constantly changing spoofed IPs, blacklisting – and ACL updates – are meaningless.

They probably expected the provider to drop the upstream router link at a certain high volume. But that didn’t happen. Using a dedicated signature, we could block the malicious traffic regardless of its IP address.

Figure 3 & 4 – Attack bursts of random durations every few minutes

“Most DDoS Protection solutions use IP blacklisting mechanisms and cannot withhold a dynamic spoofed IPs attack. This is another indication that this campaign was launched by professionals who knew exactly how to breach through a typical cloud provider DDoS protection”

[You might also like: Ask Yourself: Do I Need an Emergency Response Plan? WHY?]

Figure 5 & 6 – sustained attacks’ duration varied from minutes to hours to days

Attack mitigation:

Radware’s ERT team used several techniques in their battle against the attackers, in order to avoid even a minor impact on the users. They made multiple network optimization actions and security tunings in order to control and manage the attack traffic, including network optimization actions to adjust to the attack volume and vectors. While the initial burst caused an interruption, it allowed us to refine the tunings further, resulting in an ultimate consistency of mitigation of nearly a 100% of the attack duration.

Following the engagement of Radware’s ERT, the burst attacks have become much more complex, frequent and of longer duration, presumably due to their recognized lack of success.

At the end of the day, there are three key elements in successful mitigation, where one cannot go without the other:

  1. The technology – a behavioral analysis engine that detects anomalies in real time and protects legitimate users while blocking the attack traffic
  2. The scrubbing capacity – a broad network of high capacity scrubbing centers in various locations. Yet. even an endless capacity cannot fully protect customer SLA without the ability to distinguish between attack traffic and legitimate requests
  3. The human factor – against a team of sophisticated, determined professionals, you need a team of more sophisticated, devoted experts to win the cyber-battle

These subsequent bursts too, have been fully mitigated with no apparent or reported impact on game functionality – the SLA was protected!

Radware’s ERT remains on alert, believing the attackers will return with more sophisticated, aggressive tactics.


Read the 2016–2017 Global Application & Network Security Report by Radware’s Emergency Response Team.

Download Now


  1. After the ceremony has ended and you’ve kissed and been announced
    couple, you need to go celebrate. Another good
    thing about the web page review is always to survey for scene opportunities.
    MANY folks here would also STRONGLY encourage you
    to obtain insurance to your business.

  2. This game is the first in the series to allow Wonder Boy to roam freely by using various
    animal forms, but as with previous games in the series, Wonder Boy can also buy various weapons,
    armor and items to help him in his quest.

  3. I was recommended this blog by my cousin. I am now not positive whether this post
    is written via him as nobody else recognize
    such specified about my problem. You’re wonderful! Thank you!

  4. I really do love to help people find ways to travel, but when you’re able to do basic and fundamental research first, and then come to me with more specific questions, everybody’s happy.

  5. The only problem with Down is that if it gets wet itt won’t retain its thermal
    properties. This nifty device comes in handy as your
    traverse back with the wilderness to the Caribbean resort.
    With tese i – Pad giveaways, the conseumers get their
    hands about the latest gadgets whilst thee manufacturers can get their productrs

  6. The form is accessible web needs to be that has a college transcript, recommendations from the 3 major
    people as well as a personal statement. No one’s life has ever gone
    according to plan, so you’ve got to create the best out of this period in your life.

    By earning an accredited masters or doctoral degree in computer information science students may start the path to the career with their dreams.

  7. These deesigners who just start tneir jobss using their newly earned degree can always need
    more practicing about 1-3 years before moving up
    to more advantced positions. Use this system as a clear roadmap,
    and that means you don’t end up wandering in circles. You know when custom vehicl graphics offer an attractive
    design, since it attracts you.

  8. I feel this is among the so much important info for me.
    And i’m happy reading your article. But should observation on few general issues, The site style is great, the articles
    is actually nice : D. Good job, cheers

  9. I’d like to thank you for the efforts you have put in penning this website.
    I am hoping to check out the same high-grade blog posts
    from you in the future as well. In fact, your creative writing abilities has
    motivated me to get my own site now 😉

  10. I was curious if you happeen to considered changing the stucture of the site?
    Its extremely well written; I like what you’ve got
    to bbe able to say. But maybe an iindividual could a little even more wheen it comes to content so folks
    could connect wit this better. You have an dreadful lot of text regarding nly having
    one or perhaps 2 pictures. You may space it out far better?

  11. In addition to indeed, I’m just constantly astounded concerning the
    amazing thungs served by a person. Some four fawcts about this page are unquestionably the most effective We’ve had.

  12. The other day, while I was at work, my sister stole my iPad and tested to see
    if it can survive a twenty five foot drop,
    just so she can be a youtube sensation. My apple ipad
    is now broken and she has 83 views. I know this is
    completely off topic but I had to share it with someone!

  13. excellent put up, very informative. I’m wondering why the
    opposite experts of this sector don’t notice this.
    You must continue your writing. I’m confident, you’ve a huge readers’ base already!

  14. I don’t know if it’s just me or if everybody else encountering issues with your website.
    It looks like some of the written text within your posts are running off the screen. Can somebody else please
    provide feedback and let me know if this is happening to them too?
    This may be a problem with my web browser because I’ve had this happen before.

    عبد تا به اوضاع پیغام به این ترتیب در اینترنت نخوانده
    بودم بسیار جذاب و تمام بود و مقاله جالب
    شما درخصوص متعدد از دیدار مجدد کنندگان اینترنت کم ارزش است


Please enter your comment!
Please enter your name here