← Back to blog

How to stop a DDoS attack: emergency response, mitigation and clean traffic delivery

A practical guide to stopping a DDoS attack without improvising: identify saturation, protect legitimate users, activate mitigation, choose between blackhole, FlowSpec, protected IP transit, tunnels or reverse proxy delivery, then restore clean traffic safely.

How to stop a DDoS attack: emergency response, mitigation and clean traffic delivery
React at the right layer

The priority is to identify whether saturation hits the link, PPS, server resources, an application layer or routing.

Stop without going offline

Good mitigation filters the attack while preserving legitimate traffic and service continuity.

Prepare the post-attack architecture

After the emergency, the goal is to build a durable path: BGP, tunnels, specialised proxy or protected transit.

Stopping a DDoS attack is not a magic button. A serious attack can saturate the access link, firewall, server CPU, TCP state, UDP ports or a precise application endpoint. The right response starts by finding where the failure begins, then moving filtering to the right layer: upstream when the volume is too high, close to the service when the attack is application-based, or through a specialised layer when the protocol is sensitive such as FiveM or Minecraft.

This guide explains how to move from emergency response to stable mitigation. The goal is not just to block traffic, but to preserve legitimate users, keep routing readable, avoid false positives and deliver clean traffic back to the protected infrastructure.

Fast response

Is your service already under attack?

Peeryx can evaluate protected IP delivery, GRE/IPIP/VXLAN tunneling, cross-connect or gaming proxy delivery depending on your service and network control needs.

Understand what actually needs to be stopped

A DDoS attack attempts to make a service unavailable by sending more traffic, packets or requests than the infrastructure can process. The issue may be volumetric, with tens or hundreds of Gbps. It may be packet-rate oriented, with many small packets exhausting CPU, buffers or queues. It may also be application-specific: HTTP, TLS, login requests, UDP queries, game handshakes or API endpoints.

The first mistake is treating every attack the same way. A blackhole can save a network but disables the target. A local firewall rule is useless if the link is already full. To stop a DDoS attack properly, identify the target, protocol, volume, PPS, traffic direction and the exact point where failure starts.

Why a clean response changes everything

During an attack, every minute matters, but a brutal response can make the outage worse. Blocking too broadly can cut legitimate customers. Changing DNS without a plan creates cache issues. Moving routes without a return strategy makes troubleshooting harder. The goal is to reduce hostile traffic while keeping useful traffic alive.

For a company, hoster or game server, the cost is not only bandwidth. It includes lost customers, support tickets, refunds, reputation and time spent improvising. A clear mitigation method brings services back faster and turns the incident into a stronger architecture: upstream capacity, layered filtering, observability and clean handoff.

  • Separate network saturation from a server bug.
  • Protect real users instead of cutting everything.
  • Keep useful traces for rule improvement.
  • Plan clean traffic delivery back to the customer infrastructure.

Solutions that can stop a DDoS attack

The right solution depends on the attack type and your network control. If traffic saturates your link, action must happen upstream: transit provider, scrubbing center, FlowSpec, temporary blackhole or a protected network able to absorb the volume. If the link holds but the server suffers, better L3/L4 filtering, a router VM, a dedicated filtering server or more precise rules may be enough.

For web services, an HTTP/TLS reverse proxy can stop many application floods. For game servers, the response must respect the protocol: UDP, queries, handshakes, ports, latency and false positive tolerance. Networks with an ASN can use BGP to announce prefixes through protection. Customers without BGP can often start faster with GRE, IPIP, VXLAN or protected IP delivery.

Solution When to use it Limit to know
Blackhole Extreme emergency to save the network The target service goes offline
FlowSpec Reduce a simple pattern upstream Can create false positives if too broad
Protected IP transit Protect prefixes or exposed services Requires clean network integration
GRE/IPIP/VXLAN tunnel Protect an existing server without moving everything Return path and MTU must be controlled
Web/gaming reverse proxy Protect a precise protocol Does not always replace volumetric mitigation

Move from emergency to controlled mitigation

A serious approach first reduces saturation at the highest useful layer, then moves toward more precise rules. Massive obvious traffic should be reduced before it reaches your machines. Then filtering logic can inspect protocols, ports, packet length, flags, connection behavior or application signals.

Peeryx keeps the architecture readable: traffic enters protected capacity, L3/L4 mitigation is applied, then clean traffic is delivered through BGP, tunnel, cross-connect, protected IP or specialised proxy. Network customers keep infrastructure control through protected IP transit. Gaming customers get filtering designed not to break latency or legitimate players.

1. Identify

Find whether the outage comes from the link, PPS, firewall, server or application layer.

2. Relieve

Move filtering upstream when volume exceeds local capacity.

3. Deliver

Return clean traffic with the right model: BGP, GRE, IPIP, VXLAN, xCo or proxy.

4. Stabilise

Measure false positives, tune rules and build a playbook for the next attack.

Concrete example: an exposed server is hit by a UDP flood

Imagine a game server or public UDP service. Players see timeouts, monitoring shows a sharp traffic spike and server CPU becomes unstable. A local firewall rule may help against small noise, but if the link is saturated, unwanted packets have already consumed capacity before being dropped. The correct decision is to filter before the customer link.

A clean scenario is to route traffic through a protected layer, apply upstream reduction, then deliver legitimate traffic back to the server through a tunnel or protected IP. If the service is FiveM, Minecraft or another game, filtering must account for protocol behavior and latency. The expected result is a clear path: attack absorbed upstream, useful traffic preserved, origin server less exposed.

Common mistakes during a DDoS attack

Panic often leads to bad decisions. Many teams change port, DNS or provider without understanding the vector. Others stack local rules until they block their own users. Some wait for the hoster to do something although the contract does not cover that attack profile or volume.

Another mistake is confusing marketing capacity with real design. Effective protection must explain where traffic is absorbed, how rules are decided, how clean traffic returns, what limits exist and how intervention works during the incident. Without that, you may simply move the problem.

  • Expecting a local server to filter an attack that already saturates the link.
  • Blocking an entire country or protocol without measuring customer impact.
  • Using blackhole as the only protection strategy.
  • Forgetting MTU, return routing or asymmetry after tunneling.
  • Keeping no usable traces to improve mitigation later.

Why choose Peeryx to stop and prevent DDoS attacks

Peeryx focuses on infrastructure-grade protection: protected IP transit, delivery through tunnels or cross-connect, BGP when customers own prefixes, and specialised gaming protection when the protocol requires a different logic. This avoids reducing everything to a generic firewall promise.

The key is adapting to the real case. A hoster, dedicated server, FiveM project, ASN network and web service do not have the same constraints. Peeryx aims for clean traffic delivery, readable filtering and integration that fits customer operations.

FAQ: how to stop a DDoS attack

What should I do first during a DDoS attack?

Identify where saturation starts: network link, firewall, server, CPU, PPS or application layer. Without that, the response may be too broad or ineffective.

Can a local firewall stop a DDoS attack?

Yes for small floods or simple patterns, but not if the link is already saturated. In that case filtering must happen upstream.

Is blackhole a good solution?

It is an emergency measure to protect the rest of the network, but it disables the target service. It should not be the main strategy if availability matters.

Do I need BGP to be protected?

No. BGP is ideal for prefixes, but protection can also use protected IPs, GRE, IPIP, VXLAN, cross-connect or reverse proxy delivery.

Can Peeryx protect a server hosted elsewhere?

Yes, depending on topology. Tunnel, protected IP or reverse proxy delivery can protect an existing server without immediate migration.

Conclusion

Stopping a DDoS attack requires more than improvisation: understand the vector, act at the right layer, preserve legitimate traffic and build a clean return path to the protected service. The right solution depends on topology, protocol and network control.

The best strategy is not only to survive today’s attack. It is to build an architecture that responds faster, with fewer false positives and less stress, next time.

Resources

Related reading

To go deeper, here are other useful pages and articles.

1Tbps DDoS mitigation guide Reading time: 17 min

1Tbps DDoS mitigation: architecture, real limits and clean traffic handoff

A technical guide to what 1Tbps DDoS mitigation really means: upstream capacity, PPS saturation, BGP, FlowSpec, tunnels, cross-connects, clean traffic delivery and the mistakes to avoid before buying premium protection.

Read article
Volumetric mitigation 9 min read

How do you mitigate a DDoS attack above 100Gbps?

Link, PPS, CPU, upstream relief and clean handoff: the real framework behind credible 100Gbps mitigation.

Read the article
BGP & mitigation 8 min read

BGP Flowspec for DDoS: useful or dangerous?

What Flowspec does well, what it should never do alone and how to fit it into a safe multi-layer strategy.

Read the article
Upstream pre-filtering 8 min read

Upstream Anti-DDoS pre-filtering: when to use it and why it changes everything

Upstream Anti-DDoS pre-filtering is meant to relieve pressure early, protect links and reduce load before fine-grained decision layers take over. This guide explains when to use it, what it should actually do and why it changes the global cost/performance ratio. It also helps compare upstream Anti-DDoS pre-filtering, link relief, volumetric reduction and layered mitigation with an operator-grade architecture, operations and buying logic.

Read the article
Filtering server 11 min read

Dedicated Anti-DDoS filtering server: what is it really for?

A dedicated Anti-DDoS filtering server separates production from the decision layer, enables more precise logic and keeps the existing stack behind it. This guide explains when the model makes sense, when it does not and how to place it cleanly inside the architecture. It also helps compare dedicated Anti-DDoS filtering server, upstream filtering, clean handoff and production architecture with an operator-grade architecture, operations and buying logic.

Read the article
Clean traffic delivery 8 min read

Anti-DDoS clean traffic delivery: why the handoff matters as much as mitigation

In Anti-DDoS architecture, mitigation alone is not enough: legitimate traffic still has to be delivered back correctly. This guide explains why clean traffic handoff matters as much as scrubbing, how to choose the right delivery model and which mistakes break daily operations. It also helps compare clean traffic delivery, clean handoff, GRE, IPIP, VXLAN and cross-connect with an operator-grade architecture, operations and buying logic.

Read the article
DDoS guide Reading time: 16 min

BGP, GRE, IPIP or VXLAN: which method should you choose to receive clean traffic?

A protected IP transit guide to choose between BGP, GRE, IPIP, VXLAN or cross-connect after Anti-DDoS mitigation without breaking latency or operations.

Read article
Anti-DDoS architecture guide Reading: 15 min

L3, L4, L7 protection: the real differences in Anti-DDoS

L3, L4 and L7 are often used as sales labels, but they do not protect the same part of the traffic path. This guide explains the real differences between network, transport and application filtering, and how to choose a coherent Anti-DDoS design with protected IP transit, tunnels, reverse proxy or router VM.

Read article

Need to stop an attack or prepare real protection?

Describe your service, current hoster, exposed protocol and observed volume. Peeryx can guide you toward protected IP transit, tunnel, cross-connect, protected IP or gaming proxy delivery.