Not true about AWS or GCP. You don't get charged on ingress and it's in their best interest to mitigate this at the perimeter. L3 and Prolexic(Akamai) have all your traffic go through their scrubbing centers - really expensive. mod_evasive won't work with any half decent reflection attack. On Mon, Aug 7, 2017 at 5:55 PM, Laurentiu Pancescu < lpancescu at centosproject.org> wrote: > On 07/08/17 13:13, Karanbir Singh wrote: > >> >> I had recommended and Fabian looked at mod-evasive, but has reservations >> around that. how do people these days typically handle flood situations ? >> >> > That depends on the size and type of the attack - I think one can only > fend off small attacks. People facing DDoS probably host on a service like > OVH, which employ expensive hardware (e.g. from Arbor Networks) to handle > layer 3 attacks, or, for layer 7 attacks, hide behind an HTTP reverse proxy > like CloudFlare. There are also companies specialized in preventing > large-scale attacks (like Akamai or Level3), but they tend to be quite > expensive. AWS or Google Cloud won't go down either, but the bandwidth > bill would probably drive a small company into bankruptcy really fast. > > If it's the same set of IPs, perhaps you could ask the upstream provider > to filter them. Is the attack still going on? > > Regards, > Laurențiu > > _______________________________________________ > CentOS-devel mailing list > CentOS-devel at centos.org > https://lists.centos.org/mailman/listinfo/centos-devel > -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://lists.centos.org/pipermail/centos-devel/attachments/20170807/026efa28/attachment-0008.html>