| ||Ask HN: How is DDoS protection implemented?|
260 points by elephant0xffff on May 13, 2018 | hide | past | favorite | 54 comments |
|The big services (Google, Cloudflare, etc.) provide DDoS attack mitigation (and seem to succeed), but details on their tactics are rare (at least I did not find in-depth information on that).|
I guess to make this work well you have to do classification (regular request vs. malicious) on several protocol layers and then reroute or drop packets accordingly. But how does that prevent severe service degradation - you still have to do some kind of work (in computation and energy) on the listening side or can fat edge-servers just eat that up?
Applications are open for YC Winter 2021
| Apply to YC