Solved

X-Box .. ISP traffic over-load & shutdown.

Posted on 2014-09-15
1
305 Views
Last Modified: 2014-09-16
I have a client who's son plays X-Box through their ISP. He starts winning so his competitors start "Host-Booting" their IP address from the ISP as X-Box gives IP addresses out to other players. This overloads the ISP and then the ISP shuts down the connection due to overload, causing the son to loose connection and loose the game. Is there a way to hide the IP address that the son get's for his X-Box or overwise prevent "Host-booting" by other players. such as using a VPN connection, etc. ???
0
Comment
Question by:zargf8ns
1 Comment
 
LVL 32

Accepted Solution

by:
aleghart earned 500 total points
Comment Utility
The victim is not being "booted".  It's a DoS or DDoS attack.  The incoming traffic overwhelms the available bandwidth.  It starts  with latency increasing, ending in a completely stuffed pipe.

The cheaters can initiate a distributed attack for little or no money.  Whether it's a direct denial-of-service attack or distributed, you should report to xbox with their online forms.  Report the player for "tampering".  More info here.

A rented VPN connection might help, but the bandwidth available through the VPN connection will have higher latency and less bandwidth.  If you already have a decent connection like 20/5 @10ms  you might be able to get 10/2 @50ms.  Good enough.

The advantage of the VPN tunnel is that you can disconnect your VPN client, then reconnect, hopefully getting a new IP address.  This doesn't stop the attack.  Your VPN provider will still be suffering the effects of a DDoS attack until it subsides.

You must pause the game (or have another player pause the game) while you disconnect/reconnect.  You have to establish your VPN to mask your IP _before_ you reconnect to your game.  Otherwise, you will disclose your actual IP address, and be subject to direct attack.

I've never used one for gaming, but I know a quick google search for 'gaming vpn' will show a host of services who rent out their service for anonymizing.  You may have trouble with some other services while hidden behind an anonymizer.  Some services ban known IP addresses that belong to anonymizing networks.  Wikipedia editing is one example.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Join & Write a Comment

Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now