Solved

X-Box .. ISP traffic over-load & shutdown.

Posted on 2014-09-15
1
312 Views
Last Modified: 2014-09-16
I have a client who's son plays X-Box through their ISP. He starts winning so his competitors start "Host-Booting" their IP address from the ISP as X-Box gives IP addresses out to other players. This overloads the ISP and then the ISP shuts down the connection due to overload, causing the son to loose connection and loose the game. Is there a way to hide the IP address that the son get's for his X-Box or overwise prevent "Host-booting" by other players. such as using a VPN connection, etc. ???
0
Comment
Question by:zargf8ns
1 Comment
 
LVL 32

Accepted Solution

by:
aleghart earned 500 total points
ID: 40325001
The victim is not being "booted".  It's a DoS or DDoS attack.  The incoming traffic overwhelms the available bandwidth.  It starts  with latency increasing, ending in a completely stuffed pipe.

The cheaters can initiate a distributed attack for little or no money.  Whether it's a direct denial-of-service attack or distributed, you should report to xbox with their online forms.  Report the player for "tampering".  More info here.

A rented VPN connection might help, but the bandwidth available through the VPN connection will have higher latency and less bandwidth.  If you already have a decent connection like 20/5 @10ms  you might be able to get 10/2 @50ms.  Good enough.

The advantage of the VPN tunnel is that you can disconnect your VPN client, then reconnect, hopefully getting a new IP address.  This doesn't stop the attack.  Your VPN provider will still be suffering the effects of a DDoS attack until it subsides.

You must pause the game (or have another player pause the game) while you disconnect/reconnect.  You have to establish your VPN to mask your IP _before_ you reconnect to your game.  Otherwise, you will disclose your actual IP address, and be subject to direct attack.

I've never used one for gaming, but I know a quick google search for 'gaming vpn' will show a host of services who rent out their service for anonymizing.  You may have trouble with some other services while hidden behind an anonymizer.  Some services ban known IP addresses that belong to anonymizing networks.  Wikipedia editing is one example.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
EIGRP STUB 19 72
How to remotely connect to a pc that got stuck middle restart? 94 141
Cisco AP to get ip from DHCP 10 75
Windows Folder Permissions 9 46
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question