← Back to blog

How to handle 100Mpps+ DDoS traffic without exhausting your infrastructure

Handling 100Mpps+ requires an architecture designed for packet rate, not only for Gbps: early detection, upstream relief, fast filtering and clean traffic delivery.

How to handle 100Mpps+ DDoS traffic without exhausting your infrastructure
PPS breaks first

A firewall or server can collapse under 100Mpps even when bandwidth is not fully used.

Drop early

The closer the drop happens to the network edge, the less CPU, memory and queue pressure the attack creates.

Deliver clean traffic

The useful result is a reachable service, not only a prettier blocked-traffic chart.

Handling 100Mpps+ is not the same challenge as absorbing a few dozen Gbps. At that rate, every packet consumes parsing time, queue space, lookup capacity and sometimes state. The first limit may be a firewall, a virtual router, a NIC queue or a CPU core long before a headline bandwidth number is reached.

For hosting providers, dedicated servers, BGP networks and gaming services, high packet rate can be more destructive than a simple bandwidth flood. A credible Anti-DDoS architecture combines upstream relief, precise rules, early stateless filtering, automated thresholds and clean delivery back to production.

Protection model

Where Peeryx fits

Peeryx helps position mitigation before the bottleneck: protected IP transit, tunnel, cross-connect, dedicated server or gaming proxy depending on the service.

The real problem behind 100Mpps+

A 100Mpps+ attack sends so many packets that the limiting factor is no longer just bandwidth. The weak point can be interrupts, rule evaluation, counters, state tables or packet parsing per second.

A 100G link may still have apparent headroom while a firewall, router VM or Linux stack already drops legitimate packets. This is why bandwidth-only DDoS planning creates a dangerous false sense of safety.

Why it matters for revenue and availability

When a service fails under high PPS, users do not see a “complex attack”. They see an offline application, an unplayable game server, timeouts or support overload.

High PPS also increases false-positive risk. Under pressure, many teams apply broad emergency blocks that save the platform but break legitimate UDP, TCP sessions or latency-sensitive flows.

Selling protected IP transit, Anti-DDoS dedicated servers or gaming protection requires proving that the design understands real packet-rate limits, not only Tbps marketing.

Another key point is capacity planning during normal operation. An Anti-DDoS architecture must not only absorb attack peaks; it must also keep enough margin so legitimate users do not suffer queues, packet loss or unstable routes during mitigation.

Possible solutions for 100Mpps+

The first answer is upstream filtering: reduce packet noise before it reaches the customer port or server. This can involve FlowSpec, network ACLs, scrubbing capacity or protected transit.

The second layer is fast local filtering: XDP, eBPF, DPDK, VPP or specialized appliances depending on the environment. The hot path should stay simple, measurable and as stateless as possible.

Finally, delivery matters. GRE, IPIP, VXLAN, cross-connect or router VM must be sized for the remaining clean traffic with predictable latency.

How Peeryx approaches very high PPS attacks

Peeryx aims to reduce attack traffic before it reaches customer production. The goal is to cut packet pressure and then deliver useful traffic through a clear handoff model.

Depending on the topology, delivery can be protected IP transit with BGP, tunnel, cross-connect or a gaming reverse proxy. The right choice depends on ASN control, service type, latency target and operational expectations.

For heavily exposed profiles, the design discussion should include PPS thresholds, Gbps thresholds, critical ports, UDP/TCP behavior and return-path constraints.

Protected IP transit Protect a prefix, an ASN or exposed infrastructure before the customer link saturates.
Open offer
Anti-DDoS dedicated server Host a critical service or technical stack behind a mitigation layer that fits the use case.
Open offer
Gaming reverse proxy Protect selected game services with delivery closer to protocol needs.
Open offer
Technical contact Discuss thresholds, routing, latency and the most coherent delivery model.
Open offer

Concrete use case: gaming service under 120Mpps

A game server can receive a flood of tiny UDP packets that quickly exceeds 100Mpps. Bandwidth may not look extraordinary, but players experience lag, disconnects and connection errors.

A correct response filters impossible packets, limits abnormal sources, reduces noise upstream and delivers only coherent traffic to the server or proxy. The goal is to preserve legitimate gameplay, not to block UDP globally.

Common mistakes

The first mistake is sizing only in Gbps. The second is allowing a stateful firewall to see the full flood before mitigation. The third is assuming a powerful server will compensate for bad topology.

Another mistake is confusing mitigation charts with real quality. If clean traffic returns with heavy jitter or false positives, the protection does not meet the business need.

  • Looking only at Gbps and ignoring packets per second.
  • Letting a stateful firewall absorb the first wave.
  • Using broad rules that break UDP or legitimate sessions.
  • Forgetting latency and jitter after mitigation.

Why choose Peeryx for this use case

Peeryx focuses on infrastructures that must stay reachable under attack: protected IP transit, dedicated servers, BGP networks and game services.

The value is a technical discussion before the incident: where to filter, how to deliver, which thresholds to use and how to avoid breaking legitimate traffic.

For SEO and conversion, this precision matters because a technical buyer looks for concrete answers: traffic entry, clean traffic exit, reaction time, false-positive risk and operational responsibility. The clearer the page is, the more confidence it gives a prospect comparing providers.

Continue reading

These resources connect the 100Mpps+ topic with concrete offers: transit, dedicated server and gaming reverse proxy.

Protected IP transit Protect a prefix, an ASN or exposed infrastructure before the customer link saturates.
Open offer
Anti-DDoS dedicated server Host a critical service or technical stack behind a mitigation layer that fits the use case.
Open offer
Gaming reverse proxy Protect selected game services with delivery closer to protocol needs.
Open offer
Technical contact Discuss thresholds, routing, latency and the most coherent delivery model.
Open offer

FAQ

Frequent questions before sizing high-PPS protection.

Is 100Mpps always a huge Gbps attack?

No. Small packets can create enormous packet rate with moderate bandwidth.

Can a dedicated server alone handle 100Mpps?

Not safely. Placement and upstream reduction matter more than raw server strength.

Are game services more sensitive to PPS?

Often yes, because UDP, latency and jitter make false positives immediately visible.

Can Peeryx deliver clean traffic through a tunnel?

Yes. GRE, IPIP, VXLAN, cross-connect or another model can be selected depending on topology.

Conclusion

Handling 100Mpps+ requires understanding packet rate, CPU cost, early filtering and clean delivery. A large capacity number alone is not a defense.

The right model protects the service before saturation, limits false positives and keeps operations readable during the attack.

Resources

Related reading

To go deeper, here are other useful pages and articles.

Anti-DDoS latency Reading time: 13 min

Anti-DDoS latency explained: how mitigation affects real service quality

DDoS mitigation can add latency when routing, filtering or clean traffic delivery are poorly designed. Learn what really matters before choosing a protection model.

Read article
DDoS network impact Reading time: 13 min

DDoS impact on a network: links, routers, queues and customer services

A DDoS attack does not only affect the targeted server: it can saturate links, routers, queues and neighbouring services.

Read article
High PPS Anti-DDoS Reading time: 14 min

How to handle 100Mpps+ DDoS traffic without exhausting your infrastructure

Handling 100Mpps+ requires an architecture designed for packet rate, not only for Gbps: early detection, upstream relief, fast filtering and clean traffic delivery.

Read article
Anti-DDoS comparison Reading time: 14 min

Anti-DDoS hardware vs software: what really protects exposed infrastructure?

Comparing Anti-DDoS hardware and software means comparing placement, flexibility, filtering speed, cost and ability to adapt to modern attacks.

Read article
Scrubbing center architecture Reading time: 14 min

How does a DDoS scrubbing center work from routing to clean traffic?

A scrubbing center works as a chain: attract traffic, analyze flows, filter the attack and deliver clean traffic.

Read article
Anti-DDoS guide Reading time: 13 min

Real-time DDoS mitigation: filtering attacks before the service drops

Real-time DDoS mitigation means detecting abnormal traffic, applying precise filtering and delivering clean traffic before links, firewalls or game servers collapse.

Read article
Anti-DDoS guide Reading time: 13 min

Why firewalls fail against DDoS attacks

Classic firewalls protect policies and sessions, but DDoS attacks target capacity, packet rate and state exhaustion before the application can respond.

Read article
Anti-DDoS guide Reading time: 13 min

DDoS mitigation architecture: from attack detection to clean traffic delivery

A strong DDoS mitigation architecture combines upstream capacity, routing control, fast packet filtering, service-aware rules and clean traffic delivery via BGP, tunnel or cross-connect.

Read article
Anti-DDoS guide Reading time: 13 min

High PPS attack mitigation: protect routers, firewalls and game servers

High PPS attacks can break packet processing with modest bandwidth. Learn how to mitigate small-packet floods before routers, firewalls, VPS and gaming services lose stability.

Read article
Anti-DDoS guide Reading time: 11 min

How to detect a DDoS attack before it takes your service offline

Learn the practical signs of a DDoS attack: traffic spikes, high PPS, failed connections, abnormal UDP/TCP patterns, overloaded firewalls and degraded gaming or web services.

Read article
Anti-DDoS guide Reading time: 11 min

DDoS vs DoS: difference, impact and protection choices

Understand the difference between DoS and DDoS attacks, why it changes the mitigation design and when to choose protected IP transit, a protected server, VPS or gaming proxy.

Read article
Anti-DDoS guide Reading time: 11 min

UDP flood protection: protect servers, VPS and gaming traffic

A practical guide to protect exposed UDP services without breaking legitimate traffic for games, VPS, dedicated servers, protected transit and real-time applications.

Read article
Anti-DDoS guide Reading time: 11 min

DDoS PPS vs Gbps explained: why packet rate matters

Learn why a DDoS attack can be dangerous at low Gbps but high PPS, and how packet rate changes capacity planning for routers, firewalls, servers and Anti-DDoS platforms.

Read article
Performance comparison 9 min read

XDP vs DPDK for Anti-DDoS filtering: which one should you choose?

The XDP vs DPDK Anti-DDoS question comes up all the time. This guide gives a practical answer for network and security teams: what XDP does extremely well, when DPDK becomes the right tool and which approach usually offers the best cost, performance and operations ratio.

Read the article
DDoS guide Reading time: 8 min

High-PPS filtering design

A practical look at building filtering layers for very high packet rates without losing observability or handoff clarity.

Read article
DDoS guide Reading time: 7 min

Router VM Anti-DDoS use cases

When a router VM makes sense: keeping customer routing and filtering logic while still receiving upstream volumetric protection.

Read article
DDoS guide Reading time: 8 min

Building a filtering stack behind volumetric protection

Why some buyers want Peeryx only for the first volumetric layer while keeping their own filtering stack behind it.

Read article
DDoS guide Reading time: 7 min

PPS vs Gbps in DDoS mitigation

Why packet rate matters as much as bandwidth when evaluating DDoS mitigation, filtering servers and upstream relief.

Read article

Describe your traffic and topology

Peeryx can help you choose the right mitigation model: protected IP transit, dedicated server, tunnel, cross-connect or gaming reverse proxy depending on real exposure.