Internet Performance Delivered right to your inbox

Six Steps to DDoS Attack Mitigation Success

If a DDoS attack hasn’t happened to your organization yet, odds are one will eventually. So it’s crucial to familiarize yourself with DDoS attack mitigation best practices.

Verizon’s 2018 Data Breach Investigations Report placed DDoS attacks at the top of its Incidents by Pattern list, and thanks to the rise in Internet of Things devices, the number of attacks has increased a staggering 91%.

The following steps will help you with DDoS attack mitigation.

Don’t Panic

Your site is down. Your support team is inundated with calls, your organization is losing revenue, and everyone is looking to you for a solution … now. The most important thing you can do is remain calm and maintain control of the situation.

Have a Communication Plan

Transparency is key. Over-communicate. In the event that your site is down, redirect customers to a status page assuring users that the outage is only temporary and your team is working hard to get back online. Also, have this message prepared, and if possible automated, in response to customer inquiries to reduce stress on the support team.

Identify the Attack

There are a number of ways that a website can be taken offline or have its performance negatively affected. For example, something that may look like a DDoS attack may actually be a bot crawling your site and severely reducing availability, in which case the solution would be different. In order to find the right solution, you have to first find the actual problem.

Check your log data for these telltale signs of a DDoS attack:

  • A single IP address making a high volume of requests in a short window of time
  • Massive spikes in traffic

You can also attempt to ping your site through an external source with free online tools such as site24x7 or WebSitePulse to check availability and response time.

Additionally, some DDoS attacks happen quickly, and only take a site offline temporarily. Other attacks happen slowly and can last for months. That is why it is important to check logs and set up alerts to flag anomalies and know what your normal traffic patterns look like.

Clear Your Logs

During an attack, your system is trying frantically to log every malicious request. Logging puts a huge amount of strain on your resources and could potentially lead to a chain reaction of overloaded systems going down one after another, depending on how they are connected. After identifying the type of attack and determining that the logs are no longer needed or capturing useful data, you can clear them.

Mitigate Suspicious Traffic

Once you have determined which botnet(s), bot behaviors and (sometimes) IP addresses may be responsible for the attack, you can take action. It may be tempting to immediately block everything that appears to be suspicious, especially in the heat of the moment, but permanently blacklisting every IP address that causes an alert may result in blocking legitimate traffic because of false positives. It is best to temporarily cut off questionable traffic or redirect it to null routes where the behavior can be observed. If that traffic immediately tries to reconnect, it is most likely from legitimate users. Malicious traffic will typically switch IP addresses once it realizes it has been discovered.

In this screenshot from Oracle Dyn Web Application Security, 99% of the traffic is blocked and confirmed as attack traffic. Only 1% of the traffic is legitimate:

DDoS attack mitigation

Know and Use Your Resources

You should know your DDoS solution inside and out — not just the dashboards and reports you see on a daily basis, but also the tools that are offered during an attack. Some DDoS vendors also provide additional support from a team of experts who are trained specifically to deal with these types of attacks.

It’s not always enough just to have a DDoS attack mitigation service in place. Understanding the quality of your DDoS protection is key, because not all solutions provide the same caliber of mitigation. Ask your provider to present data showing the effectiveness of their product, such as the stability of traffic redirects and the effectiveness of their hand-off coverage.

Under attack or think your sites may not have the protection they need? Oracle Dyn has deep internet infrastructure and security domain expertise and a battle-tested team of professionals. The Oracle Dyn Web Application Security suite offers DDoS protection as part of its integrated platform with 24x7x365 managed support.  Learn more at If you’re under attack, reach out to our  emergency onboarding team.

Share Now

Whois: Rebecca Carter

Rebecca Carter is a Product Marketing Manager at Oracle Dyn Global Business Unit, a pioneer in managed DNS and a leader in cloud-based infrastructure that connects users with digital content and experiences across a global internet.

To current Dyn Customers and visitors considering our Dynamic DNS product: Oracle acquired Dyn and its subsidiaries in November 2016. After June 29th, 2020, visitors to will be redirected here where you can still access your current Dyn service and purchase or start a trial of Dynamic DNS. Support for your service will continue to be available at its current site here. Sincerely, Oracle Dyn