DDoS Attack Response Quickstart

Time-boxed response path for an active denial-of-service attack. DDoS is a speed-plus-volume problem; mitigation latency kills more than attack magnitude. This path emphasizes rapid characterization, scrubbing activation, and parallel hunting for secondary intrusion that may be hidden behind the flood.

Kit
Overall Progress0 of 10 (0%)
Track Progress

First 15 Minutes

0/3
0 of 3 (0%)
01

Confirm DDoS vs Legitimate Surge

Critical
~5 min

Confirm the traffic spike is an attack, not a marketing event, viral launch, or legitimate bot surge (search-engine crawl, partner integration). Check for anomalous source profiles (many low-throughput IPs, specific ASN concentration, reflector set with amplifying servers), request patterns (repetitive small packets, implausibly-formed requests), and magnitude vs baseline.

02

Characterize Attack Layer and Vector

Critical
~5 min

Classify by layer (L3/L4 vs L7) and vector (SYN flood, UDP flood, reflection/amplification via DNS/NTP/Memcached/SSDP/CLDAP, HTTP flood, Slowloris, cache-buster, search-expensive queries). Mitigation differs per layer; applying a volumetric fix to an L7 attack wastes the window. Record peak pps, bps, and RPS.

03

Activate Upstream Scrubbing

Critical
~5 min

Activate the pre-existing DDoS response contract with your upstream provider (Cloudflare, Akamai, AWS Shield Advanced, Fastly). If no contract, initiate emergency engagement immediately -- most providers offer emergency onboarding but at premium. Route volumetric traffic through scrubbing via BGP redirection or anycast DNS redirection.

First 60 Minutes

0/3
0 of 3 (0%)
04

Apply Edge Rate Limits and Geo Controls

Critical
~20 min

Apply edge rate limiting per-IP and per-subnet on affected endpoints. For clear source concentrations, apply geo-blocking or ASN-blocking at the edge with a planned revert once the attack subsides. Start with less-aggressive limits and escalate; over-aggressive edge controls block legitimate users.

05

Enable L7 Mitigations for Application-Layer Attacks

Critical
~20 min

For L7 attacks: enable WAF rate limiting, bot management (Cloudflare Bot Management, Akamai Bot Manager, Imperva), JS challenges, and CAPTCHA on high-cost endpoints. Cache previously uncached responses, serve static fallback, and temporarily disable expensive search/filter endpoints if needed.

06

Parallel: Hunt for Secondary Intrusion

Critical
~20 min

DDoS is sometimes used as cover for concurrent intrusion (data theft, ransomware staging, credential attacks). While the network team fights the flood, SOC should hunt for anomalous authentication, internal lateral movement, data egress, or new outbound C2 that may be hidden by the traffic event. This parallel track is commonly skipped and commonly regretted.

First 4 Hours

0/4
0 of 4 (0%)
07

Customer Communications and Status

~60 min

Update customer-facing status page on a defined cadence (every 30-60 minutes for active events). Without over-disclosing attack specifics, communicate impact and expected mitigation progress. Engage customer-success and support teams for account-level communication; track SLA credit exposure as you go.

08

Watch for Attack Morphing

~60 min

Attack vectors change mid-attack as attackers probe for gaps in mitigation. Maintain ongoing characterization and be ready to adjust scrubbing profiles and WAF rules. Log the vector-by-vector progression so the post-incident review can size future resilience accurately.

09

Check for Extortion Demand and LEA Engagement

~30 min

Some DDoS attacks are accompanied by ransom-DDoS (RDDoS) extortion demands. Do not pay. Engage law enforcement and scrubbing providers with ecosystem experience; they often have intelligence on the group and payment-doesn-not-help data. Coordinate with legal on any extortion-communication handling.

10

Kick Off Resilience Review

~90 min

Within 4 hours, begin capturing inputs for the post-incident resilience review: mitigation latency (detection to scrubbing to full mitigation), capacity (attack traffic mitigated at each layer), architectural observations (origin exposure, DNS TTL effectiveness), cost impact. The freshest data is the most useful.