These days, gaining access to a botnet (a large collection of infected computers) is insanely easy. For anyone with a functional brain, finding a way to DDoS someone offline is as easy as Googling a few of the right words and paying $15/month for access to a shell booter site. With it being relatively easy these days to launch these attacks against individuals, it becomes necessary to take certain precautions, especially depending on your line of work, to protect yourself from these types of attacks.
My goal in writing this is to give everyone a free, bullet-proof way to defend themselves from DDoS attacks. I have extensive experience with all of the methods and programs that I will suggest using in the following pages. Everything has been tried (and is currently being used) by me. I have exhaustively considered various options at every single stage of what I’m going to recommend in this guide, but I will assure you that everything I suggest is the most time-efficient and cost-effective alternative that I have come across. I don’t have a networking degree, I don’t work for a big company and I’m not being paid for or sponsored by any of the programs I am going to recommend.
I have seen dozens of other anti-DDoS guides on the internet, the reason I am writing mine is because most of those are garbage. I have seen guides where people will spout off an impressive list of qualifications and then go on to spew misinformation. Again, I am not here to do that. I am using the exact method to protect my IP that I will outline in the following pages, and to this date I have had a 100% success rate in thwarting people who wish to harm my connection.
I am going to do this write-up in two parts. The first part is going to be a step-by-step analysis of every bit of information and software I’m talking about. In my personal opinion, everyone should strive to understand these relatively simple concepts, especially if you’re going to be taking advantage of any of the software that I mention later on. It’ll give you a greater appreciation and understanding of everything you are about to do, and overall it will be a life-enriching experience where you expand your knowledge and become a better person (because who isn’t at least a little bit curious about all of the inner workings of the things we deal with every day?). The second part will just be the instructions necessary to install and set-up the programs needed to ensure a safe experience on programs that can release your IP address into the wilderness.
What is a DDoS attack?
DDoS stands for “Distributed Denial of Service”. Essentially, a person in control of hundreds or thousands of different systems (a distribution of systems, if you will) will direct all of those computers to flood the bandwidth available to a given IP address. The resulting flood “attack” serves to effectively destroy your ability to send or receive data on (or denies your service to) the internet. This can be done using a variety of methods, such as by overloading your routers ability to receive requests, or physically over-saturating your bandwidth such that no useful data can pass through. The exact method isn’t important, though. Just the concept that your internet will be virtually unusable for 1-2 minutes while the attack is performed.
How is a DDoS attack performed?
Rarely will a person targeting someone for an attack actually have physical access to the machines being used to attack your system. The more common route is that someone will pay a certain monthly fee to have access to a larger botnet that advertises itself as a “website stresser”. Once he signs up for the website, he will get a referral link that he can send to other people. This referral link will report to him all of the IP addresses that click on the link. So if someone sends you a shady link with a referral at the end and you click it, there’s a possibility that he’s logged whatever IP Address you were accessing the internet on when you clicked said link. The reason why attacks are only sustained for 1-2 minutes is due to the fact that the owners managing the shell booter don’t want their resources being exhausted, as they provide a service to a lot of other script kiddies.
How do I know if I’m being DDoS’d?
Unfortunately this question is incredibly difficult to answer. Honestly, the proper way to do it is outside of the scope of this article. I’ve seen a ton of suggestions on the ‘net, ranging from “ping google.com” to “check your router status”, but none of these can give you a absolute answer that confirms you’re being DDoS’d. Unfortunately, the only way to determine you’re being DDoS’d is through a lot of investigation and a little bit of common sense.
Do you find yourself getting DDoS’d whenever you play against the same player? Is someone extorting you for money, saying it will stop? Did a bunch of untraceable/otherwise seemingly random internet problems start popping up after clicking a random link? When you do get disconnected during a game, is it always for only 1-2 minute spurts? Have you called your ISP multiple times and confirmed that no one else was experiencing an outage or any other interruption of service?
Like I said, there’s no absolute way to figure out if you’re being DDoS’d. It’s just something you have to figure out with a lot of digging around. That being said, it never hurts to protect yourself from the possibility, especially if it’s free.
For your convenience, I’ve provided a flow chart that summarizes how a DDoS works.