
Originally Posted by
Kailyn_Swiftheart
Spoken like a true non-cybersecurity expert.
I work in offensive cybersecurity at the NSA. (It's my job to do things like DoS, hacking, etc)
There are absolutely ways to prevent DDoS attacks, assuming they are happening directly against SE servers themselves, and not somewhere immediately upstream.
If SE separates their active directory server from their game servers, and only allows connections to the game server once authorized by the active directory (this can be done via ESTABLISHED lines in iptables on a Linux system), you can drop all packets unrelated to legitimate connections to the game servers. This would not prevent a DDoS attack against the active directory, of course, but any such attack would only prevent people from trying to log into the game. It would have no effect on active connections.
You can also limit the number of connections per second, among other actions. There are a myriad of solutions available in the modern era.
If the attacks are coming from upstream, the ISP should have alternate routes for traffic. If they don't, then it's a terrible ISP, and SE should consider changing contracts. I've heard this is the case.
There is absolutely no excuse for bad cybersecurity policy. The fact of the matter is, that's exactly what is happening here, whether it's on SE's side or on their ISP. Someone isn't doing their job, and we're all made to suffer for it.