Solved

DDOS information about ip's, gateways and how it works

Posted on 2016-11-17
2
164 Views
1 Endorsement
Last Modified: 2016-11-30
Hi.

Lets say router 123.124.3.12 is under a DDOS attack.
I got another router 123.124.3.13.
The gatewaye for both is 123.124.3.11

If i disconnect router 123.124.3.12, will the attack then stop?

If the attack does not stop, what is under attack? Still 123.124.3.12? Or maybe the gateway 123.124.3.11?

Is there any way to be sure what ip is/gateway under the attack?




----- If some ip is under attack, does it even matter if some router is in the end of the ip's attack? Or will it just stop the whole gateway from working, even if nothing is connected?
1
Comment
Question by:Mike Kristensen
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 29

Assisted Solution

by:serialband
serialband earned 250 total points
ID: 41891769
It depends.

If they're targeting just the IP address, then, yes it will stop if you disconnect it.  The packets would have nowhere to go.

If they're targeting DNS names and you have redundant routes, then, no, it won't stop.  That's also assuming you're using an external DNS provider that has more capacity than your own systems.
1
 
LVL 29

Accepted Solution

by:
masnrock earned 250 total points
ID: 41896075
Sounds like your IPs are from a cable company.

But to answer your question, if you're noticing the router still having a considerable amount of traffic after changing the IP, the attackers be could attacking by IP range, subnet, or DNS name....

The only way you're going to know for sure how broad an attack is going on would probably by checking the with ISP. They will notice an abnormally high amount of traffic, but they will argue that it's your job to properly secure yourself.
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A 2007 NCSA Cyber Security survey revealed that a mere 4% of the population has a full understanding of firewalls. As business owner, you should be part of that 4% that has a full understanding.
Article by: Justin
In light of the WannaCry ransomware attack that affected millions of Windows machines, you might wonder if your Mac needs protecting. Yes, it does and here is how to do it.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question