← Back to blog

DDoS PPS vs Gbps explained: why packet rate matters

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

DDoS PPS vs Gbps explained: why packet rate matters
Gbps measures volume

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

PPS measures packet pressure

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

Capacity planning needs both

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

Gbps is the visible number in most DDoS discussions, but PPS often explains why a service collapses. A flood can be “small” in bandwidth and still overload packet processing, interrupts, firewall state or routing logic.

Teams that buy Anti-DDoS protection should read both metrics. Gbps tells how much capacity is consumed; PPS tells how many packet decisions must be made every second. A credible design needs headroom for both.

Protection model

Where Peeryx fits

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

Definition of the problem

Gbps measures the amount of data per second. PPS measures the number of packets per second. During DDoS, those two numbers can move independently: large packets create volume, small packets create processing pressure.

A 5 Gbps attack with tiny packets can be harder for a server than a 50 Gbps attack made of larger packets, because each packet triggers parsing, queueing, counters, ACL checks or state decisions.

Why PPS changes protection design

PPS matters because routers, firewalls, NIC queues and kernels all have packet processing limits. Once those limits are reached, latency rises, packet loss appears and legitimate sessions fail even if the uplink is not full.

For gaming, the symptom can look like lag. For hosting, it can look like random VPS outages. For transit customers, it can create unexpected CPU pressure on equipment that was sized only by bandwidth.

Possible solutions

Capacity planning should combine port speed, filtering throughput, packet-rate limits, queue layout and upstream relief. Looking only at bandwidth leads to overconfidence.

High-PPS filtering benefits from early drops, simple hot paths, upstream FlowSpec or ACL help when useful, and clear separation between volumetric mitigation and deeper service logic.

  • Protected IP transit — For networks that need clean traffic delivery, BGP or tunnel-based handoff.
  • DDoS-protected dedicated server — For customers who want protected compute close to the filtering layer.
  • Gaming reverse proxy — For FiveM, Minecraft and other game services where protocol behaviour matters.

How Peeryx reads PPS and Gbps together

Peeryx treats Gbps and PPS as two different risk indicators. Volumetric traffic must be reduced before it fills links, while high-PPS noise must be handled before it burns CPU on the protected endpoint.

This reading is useful for protected IP transit, dedicated protected servers and gaming proxies because each model has a different bottleneck and a different clean-traffic delivery path.

Protected IP transit For networks that need clean traffic delivery, BGP or tunnel-based handoff.
Open offer
DDoS-protected dedicated server For customers who want protected compute close to the filtering layer.
Open offer
Gaming reverse proxy For FiveM, Minecraft and other game services where protocol behaviour matters.
Open offer
Talk to Peeryx Share your topology and attack symptoms for a realistic recommendation.
Open offer

Concrete use case

A customer sees only 8 Gbps on graphs but the firewall becomes unstable. The real problem is 12 Mpps of small UDP packets. Buying a bigger port alone would not fix the firewall path; filtering must happen earlier and with less stateful work.

Another customer receives 80 Gbps of larger packets. The port is the first bottleneck, so upstream capacity and traffic shaving matter more than local CPU tuning.

Common mistakes

The first mistake is to advertise only Tbps and ignore Mpps. The second is to test with synthetic large packets and assume the result applies to real attack traffic.

The third is to place a stateful firewall in front of everything. Stateful devices are useful, but during high-PPS floods they can become the bottleneck that attackers wanted to hit.

Why choose Peeryx

The best SEO-friendly answer is also the best engineering answer: explain the attack type, show the operational impact and choose the mitigation model that matches the real service.

Related Peeryx resources

Protected IP transit For networks that need clean traffic delivery, BGP or tunnel-based handoff.
Open offer
DDoS-protected dedicated server For customers who want protected compute close to the filtering layer.
Open offer
Gaming reverse proxy For FiveM, Minecraft and other game services where protocol behaviour matters.
Open offer
Talk to Peeryx Share your topology and attack symptoms for a realistic recommendation.
Open offer

FAQ

Is Anti-DDoS only useful during large attacks?

No. Smaller high-PPS or protocol-specific attacks can break services even when bandwidth looks acceptable.

Can I protect an existing server without moving it?

Often yes. Depending on routing and topology, clean traffic can be delivered through tunnel, cross-connect, protected IP path or proxy.

Does gaming need a different approach?

Yes. Game protocols often use UDP and latency-sensitive queries, so generic filtering can break legitimate players.

Should I choose protected transit or a protected server?

Protected transit fits networks and prefixes; a protected server or VPS is simpler when you want hosted infrastructure with protection included.

Conclusion

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

The best SEO-friendly answer is also the best engineering answer: explain the attack type, show the operational impact and choose the mitigation model that matches the real service.

Resources

Related reading

To go deeper, here are other useful pages and articles.

Anti-DDoS guide Reading time: 11 min

How to detect a DDoS attack before it takes your service offline

Learn the practical signs of a DDoS attack: traffic spikes, high PPS, failed connections, abnormal UDP/TCP patterns, overloaded firewalls and degraded gaming or web services.

Read article
Anti-DDoS guide Reading time: 11 min

DDoS vs DoS: difference, impact and protection choices

Understand the difference between DoS and DDoS attacks, why it changes the mitigation design and when to choose protected IP transit, a protected server, VPS or gaming proxy.

Read article
Anti-DDoS guide Reading time: 11 min

UDP flood protection: protect servers, VPS and gaming traffic

A practical guide to protect exposed UDP services without breaking legitimate traffic for games, VPS, dedicated servers, protected transit and real-time applications.

Read article
Anti-DDoS guide Reading time: 11 min

DDoS PPS vs Gbps explained: why packet rate matters

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

Read article
Performance comparison 9 min read

XDP vs DPDK for Anti-DDoS filtering: which one should you choose?

The XDP vs DPDK Anti-DDoS question comes up all the time. This guide gives a practical answer for network and security teams: what XDP does extremely well, when DPDK becomes the right tool and which approach usually offers the best cost, performance and operations ratio.

Read the article
DDoS guide Reading time: 8 min

High-PPS filtering design

A practical look at building filtering layers for very high packet rates without losing observability or handoff clarity.

Read article
DDoS guide Reading time: 7 min

Router VM Anti-DDoS use cases

When a router VM makes sense: keeping customer routing and filtering logic while still receiving upstream volumetric protection.

Read article
DDoS guide Reading time: 8 min

Building a filtering stack behind volumetric protection

Why some buyers want Peeryx only for the first volumetric layer while keeping their own filtering stack behind it.

Read article
DDoS guide Reading time: 7 min

PPS vs Gbps in DDoS mitigation

Why packet rate matters as much as bandwidth when evaluating DDoS mitigation, filtering servers and upstream relief.

Read article

Ask for technical advice

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.