Original message details are unavailable.
Hi,
there seem to be a decent amount of misconceptions when it comes to DDoS-attacks. Firstly, it's important to stress that companies such as Microsoft and Sony experienced severe attacks which effectively shut down respectively the XBox Live and Playstation network for several days. Moreover, these networks remain, for the most part, open for similar attacks in the future.
In the recent years we've seen a worrying shift towards DDoS-attackers using amplification techniques to multiply the traffic volume they send (i.e.. DNS reflection where every request from a botnet may be amplified upwards 70x times - thus making it very easy overload the target's server). This is typically done using open and accessible DNS-servers and is thus depending on the owner's ability to update and patch their servers - in other words; very limited what Jagex can do.
Under normal circumstances, server owners (in this case Jagex) would have a few options available to hinder an attack's effect (i.e. automated mitigation, upstream blackholing filtering UDP-traffic, third-party provider (basically add an extra layer) and hardware upgrades), but due to the extreme amount of traffic (300gbps+) produced by the aforementioned attacks it is very limited what they can do.
To solve these issues effectively it would require a worldwide effort from numerous parties. ISPs, for instance, need to filter traffic on their network so that packets with spoofed IPs (source addresses which unreachable packet paths) are automatically rejected.
There is a lot of interesting articles on this topic online, and I'd encourage you to read some of these, if you are interested, to get a better understanding of how it works. All in all however it unfortunately remains limited what Jagex can do, but rest assured they are doing everything possible.
can you kiss ***ex* ass anymore? seriously you are pathetic.
13-Feb-2015 02:46:08