← Back to blog

High PPS attack mitigation: protect routers, firewalls and game servers

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

High PPS attack mitigation: protect routers, firewalls and game servers
PPS is a processing attack

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

Small packets hurt stability

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

Early drops protect services

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

High PPS attacks are dangerous because they attack packet processing, not only bandwidth. A graph can show modest Gbps while routers, firewalls, kernels or game servers collapse under millions of tiny packets per second. That is why high PPS mitigation must be designed differently from simple volumetric capacity.

For hosting providers, VPS platforms and gaming services, PPS is often the hidden reason for instability. The user sees lag or timeouts, while the operator sees queues, CPU spikes, drops and equipment that was sized for Gbps but not Mpps.

Protection model

Where Peeryx fits

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

PPS attacks target decisions per second

Every packet requires work: receive, queue, parse, match rules, update counters or decide whether to keep state. Small packets make that work happen more often for the same bandwidth.

A high PPS flood can therefore hurt even when the link is not full. The bottleneck becomes packet decisions, memory access, interrupts, NIC queues or firewall state.

Why Mpps matters for customer experience

When PPS limits are reached, latency becomes unstable before the service fully disappears. Games feel laggy, APIs return intermittent errors and VPS customers report random network issues.

This is commercially dangerous because the attack looks like poor infrastructure quality. Customers may not care that bandwidth graphs look acceptable; they care that packets are lost.

The practical objective is to protect revenue, support teams and brand trust, not just to make a graph look clean. A mitigation article must therefore connect technical symptoms to business continuity: what stays online, what is degraded and how quickly the client can recover normal routing.

How to mitigate high PPS floods

The best mitigation drops unwanted traffic as early and cheaply as possible. Stateless first-pass filters, upstream relief, FlowSpec or ACL assistance and careful queue design all matter.

Stateful inspection should be used after the obvious noise is removed. Otherwise the attacker forces expensive logic to run on packets that should never reach that layer.

Before choosing a model, define the protected asset precisely: a full ASN, a single prefix, one VPS, one dedicated server or one game endpoint. The best solution changes when the bottleneck is upstream bandwidth, packet rate, firewall state or protocol behavior.

How Peeryx handles PPS pressure

Peeryx reads PPS and Gbps together. A 10 Gbps high-PPS flood can be more urgent than a larger flood with easy-to-classify packets. The mitigation path is chosen according to the bottleneck.

For protected transit, that means reducing noise before delivery. For servers and gaming, it means preserving legitimate small-packet behavior while removing abusive rates and patterns.

This is also why Peeryx separates delivery models instead of forcing every customer into the same product. Transit customers need routing freedom, while gaming and server customers often need a more operationally simple path.

Protected IP transit Use BGP, tunnel or cross-connect delivery when the protected perimeter must sit before your server.
Open offer
DDoS protected dedicated server A better fit when you need compute close to the filtering stack.
Open offer
Gaming reverse proxy For selected game services where protocol-aware delivery matters.
Open offer
Technical contact Discuss capacity, routing and mitigation thresholds before production.
Open offer

Concrete example

A game server receives only 7 Gbps, but the packet rate reaches several Mpps. The host firewall becomes unstable and legitimate players disconnect. Increasing port speed alone will not solve it.

Early filtering removes the repeated pattern before the server. Clean traffic is then delivered through the appropriate path, keeping the game responsive.

Common mistakes

Testing only with large packets gives false confidence. Real attacks often use small packets specifically to pressure processing.

Another mistake is placing verbose counters, logging or stateful rules in the hot path. During high PPS, every extra operation matters.

Why choose Peeryx

The right choice is not only advertised capacity: it is the filtering point, precision, clean handoff and the ability to keep customers online during the attack.

Related Peeryx resources

Protected IP transit Use BGP, tunnel or cross-connect delivery when the protected perimeter must sit before your server.
Open offer
DDoS protected dedicated server A better fit when you need compute close to the filtering stack.
Open offer
Gaming reverse proxy For selected game services where protocol-aware delivery matters.
Open offer
Technical contact Discuss capacity, routing and mitigation thresholds before production.
Open offer

FAQ

Is this only for very large attacks?

No. Medium-size attacks can be critical when PPS, state or protocol behavior hits the wrong bottleneck.

Can this protect gaming services?

Yes, when filtering keeps legitimate real-time traffic instead of blocking the whole protocol.

Do I need BGP?

BGP is useful for prefixes and transit, but tunnel, protected server or proxy delivery may fit other cases.

What should be checked first?

Capacity, PPS, routing path, service protocol and how clean traffic returns to production.

Conclusion

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

The right choice is not only advertised capacity: it is the filtering point, precision, clean handoff and the ability to keep customers online during the attack.

Resources

Related reading

To go deeper, here are other useful pages and articles.

Anti-DDoS latency Reading time: 13 min

Anti-DDoS latency explained: how mitigation affects real service quality

DDoS mitigation can add latency when routing, filtering or clean traffic delivery are poorly designed. Learn what really matters before choosing a protection model.

Read article
DDoS network impact Reading time: 13 min

DDoS impact on a network: links, routers, queues and customer services

A DDoS attack does not only affect the targeted server: it can saturate links, routers, queues and neighbouring services.

Read article
High PPS Anti-DDoS Reading time: 14 min

How to handle 100Mpps+ DDoS traffic without exhausting your infrastructure

Handling 100Mpps+ requires an architecture designed for packet rate, not only for Gbps: early detection, upstream relief, fast filtering and clean traffic delivery.

Read article
Anti-DDoS comparison Reading time: 14 min

Anti-DDoS hardware vs software: what really protects exposed infrastructure?

Comparing Anti-DDoS hardware and software means comparing placement, flexibility, filtering speed, cost and ability to adapt to modern attacks.

Read article
Scrubbing center architecture Reading time: 14 min

How does a DDoS scrubbing center work from routing to clean traffic?

A scrubbing center works as a chain: attract traffic, analyze flows, filter the attack and deliver clean traffic.

Read article
Anti-DDoS guide Reading time: 13 min

Real-time DDoS mitigation: filtering attacks before the service drops

Real-time DDoS mitigation means detecting abnormal traffic, applying precise filtering and delivering clean traffic before links, firewalls or game servers collapse.

Read article
Anti-DDoS guide Reading time: 13 min

Why firewalls fail against DDoS attacks

Classic firewalls protect policies and sessions, but DDoS attacks target capacity, packet rate and state exhaustion before the application can respond.

Read article
Anti-DDoS guide Reading time: 13 min

DDoS mitigation architecture: from attack detection to clean traffic delivery

A strong DDoS mitigation architecture combines upstream capacity, routing control, fast packet filtering, service-aware rules and clean traffic delivery via BGP, tunnel or cross-connect.

Read article
Anti-DDoS guide Reading time: 13 min

High PPS attack mitigation: protect routers, firewalls and game servers

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

Read article
Anti-DDoS guide Reading time: 11 min

How to detect a DDoS attack before it takes your service offline

Learn the practical signs of a DDoS attack: traffic spikes, high PPS, failed connections, abnormal UDP/TCP patterns, overloaded firewalls and degraded gaming or web services.

Read article
Anti-DDoS guide Reading time: 11 min

DDoS vs DoS: difference, impact and protection choices

Understand the difference between DoS and DDoS attacks, why it changes the mitigation design and when to choose protected IP transit, a protected server, VPS or gaming proxy.

Read article
Anti-DDoS guide Reading time: 11 min

UDP flood protection: protect servers, VPS and gaming traffic

A practical guide to protect exposed UDP services without breaking legitimate traffic for games, VPS, dedicated servers, protected transit and real-time applications.

Read article
Anti-DDoS guide Reading time: 11 min

DDoS PPS vs Gbps explained: why packet rate matters

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

Read article
Performance comparison 9 min read

XDP vs DPDK for Anti-DDoS filtering: which one should you choose?

The XDP vs DPDK Anti-DDoS question comes up all the time. This guide gives a practical answer for network and security teams: what XDP does extremely well, when DPDK becomes the right tool and which approach usually offers the best cost, performance and operations ratio.

Read the article
DDoS guide Reading time: 8 min

High-PPS filtering design

A practical look at building filtering layers for very high packet rates without losing observability or handoff clarity.

Read article
DDoS guide Reading time: 7 min

Router VM Anti-DDoS use cases

When a router VM makes sense: keeping customer routing and filtering logic while still receiving upstream volumetric protection.

Read article
DDoS guide Reading time: 8 min

Building a filtering stack behind volumetric protection

Why some buyers want Peeryx only for the first volumetric layer while keeping their own filtering stack behind it.

Read article
DDoS guide Reading time: 7 min

PPS vs Gbps in DDoS mitigation

Why packet rate matters as much as bandwidth when evaluating DDoS mitigation, filtering servers and upstream relief.

Read article

Talk to an engineer

Peeryx can review your DDoS exposure and suggest a practical model: protected IP transit, tunnel, protected server or gaming reverse proxy.