DDoS Attack¶
Your website or services are being overwhelmed by a flood of traffic, making them unavailable to legitimate users. DDoS (Distributed Denial of Service) attacks can last hours to days and are often used for extortion, hacktivism, or as cover for other attacks.
Types of DDoS Attacks¶
- Volumetric - Flood of traffic overwhelming bandwidth (UDP floods, DNS amplification)
- Protocol - Exploiting network protocol weaknesses (SYN floods)
- Application - Targeting specific applications/features (HTTP floods, Slowloris)
Immediate Actions¶
- Contact your hosting provider/ISP - They may be able to filter traffic upstream
- Enable DDoS protection - Cloudflare, AWS Shield, etc.
- Document the attack - Traffic patterns, source IPs, timing
- Check for other attacks - DDoS is sometimes used as a distraction
- Consider reporting - To CERT-SE if significant
Free DDoS Protection Services¶
Cloudflare (Free Tier)¶
- Website: cloudflare.com
- Free plan includes basic DDoS protection
- "Under Attack Mode" for active attacks
- Easy DNS-based setup
Project Galileo (Cloudflare)¶
- Website: cloudflare.com/galileo
- Free for: Journalists, human rights organizations, democracy advocates
- Full enterprise-level protection at no cost
Deflect¶
- Website: deflect.ca
- Free for: Independent media, civil society, human rights organizations
- Run by eQualitie, focused on at-risk websites
Google Project Shield¶
- Website: projectshield.withgoogle.com
- Free for: News sites, journalists, human rights organizations, election monitoring
- Unlimited free protection
Commercial DDoS Protection¶
| Provider | Suitable For | Website |
|---|---|---|
| Cloudflare Pro/Business | SMEs | cloudflare.com |
| AWS Shield | AWS customers | aws.amazon.com/shield |
| Azure DDoS Protection | Azure customers | azure.microsoft.com |
| Akamai Prolexic | Enterprise | akamai.com |
| Imperva | Enterprise | imperva.com |
During an Attack¶
Enable "Under Attack Mode" (Cloudflare)¶
If using Cloudflare: 1. Log into Cloudflare dashboard 2. Select your domain 3. Click "Under Attack Mode" in Quick Actions 4. This adds a JavaScript challenge to all visitors
Rate Limiting¶
Configure your web server to limit requests:
Nginx:
limit_req_zone $binary_remote_addr zone=one:10m rate=10r/s;
Apache:
<IfModule mod_ratelimit.c>
SetOutputFilter RATE_LIMIT
SetEnv rate-limit 400
</IfModule>
Block Attack Sources¶
If attack sources are identifiable: - Block by IP range at firewall level - Use GeoIP blocking if attack originates from specific countries - Work with your ISP for upstream filtering
After the Attack¶
- Analyze logs - Understand the attack pattern
- Review infrastructure - Identify weak points
- Implement permanent protection - CDN, DDoS mitigation
- Create incident report - Document for future reference
- Consider reporting - Police if extortion involved
Evidence to Preserve¶
- [ ] Traffic logs with timestamps
- [ ] Attack source IP addresses
- [ ] Traffic volume statistics
- [ ] Screenshots of monitoring dashboards
- [ ] Any ransom/extortion messages
- [ ] Timeline of the attack
Swedish Resources¶
CERT-SE¶
- Website: cert.se
- Report significant DDoS attacks
- May have intelligence on attack campaigns
Police¶
- Report if: Extortion involved, significant business impact
- Website: polisen.se/anmal
DDoS Analysis Tools¶
Check If You're Under Attack¶
- Down For Everyone: downforeveryoneorjustme.com - Is your site actually down?
- Digital Attack Map: digitalattackmap.com - Global DDoS visualization
Analyze Traffic¶
- Wireshark: wireshark.org - Packet analysis
- ntopng: ntop.org - Network traffic monitoring
Guides & Documentation¶
CISA DDoS Guidance¶
- Website: cisa.gov/understanding-and-responding-distributed-denial-service-attacks
- Comprehensive response guide
Cloudflare Learning Center¶
- Website: cloudflare.com/learning/ddos
- Excellent DDoS explainers
AWS DDoS White Paper¶
- Website: docs.aws.amazon.com/whitepapers/latest/aws-best-practices-ddos-resiliency
- Technical best practices
If Extortion Is Involved¶
Some attackers demand ransom to stop DDoS attacks:
- Do NOT pay - No guarantee attacks will stop, encourages more attacks
- Document all communications - Screenshots, preserve emails
- Report to police - This is criminal extortion
- Implement protection - Better to invest in mitigation than pay attackers
Need Help?¶
If your Swedish organization is under DDoS attack:
Apply to HackAid - We can help analyze the attack and recommend protection.
Last updated: 2026-01