DDOS information about ip's, gateways and how it works

Posted on 2016-11-17
Medium Priority
1 Endorsement
Last Modified: 2016-11-30

Lets say router is under a DDOS attack.
I got another router
The gatewaye for both is

If i disconnect router, will the attack then stop?

If the attack does not stop, what is under attack? Still Or maybe the gateway

Is there any way to be sure what ip is/gateway under the attack?

----- If some ip is under attack, does it even matter if some router is in the end of the ip's attack? Or will it just stop the whole gateway from working, even if nothing is connected?
Question by:Mike Kristensen
LVL 32

Assisted Solution

serialband earned 1000 total points
ID: 41891769
It depends.

If they're targeting just the IP address, then, yes it will stop if you disconnect it.  The packets would have nowhere to go.

If they're targeting DNS names and you have redundant routes, then, no, it won't stop.  That's also assuming you're using an external DNS provider that has more capacity than your own systems.
LVL 34

Accepted Solution

masnrock earned 1000 total points
ID: 41896075
Sounds like your IPs are from a cable company.

But to answer your question, if you're noticing the router still having a considerable amount of traffic after changing the IP, the attackers be could attacking by IP range, subnet, or DNS name....

The only way you're going to know for sure how broad an attack is going on would probably by checking the with ISP. They will notice an abnormally high amount of traffic, but they will argue that it's your job to properly secure yourself.

Featured Post

Never miss a deadline with monday.com

The revolutionary project management tool is here!   Plan visually with a single glance and make sure your projects get done.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

There's never been a better time to become a computer scientist. Employment growth in the field is expected to reach 22% overall by 2020, and if you want to get in on the action, it’s a good idea to think about at least minoring in computer science …
A discussion about Penetration Testing and the Tools used to help achieve this important task.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

597 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question