Gaming industry under DDoS attack. Get DDoS protection now. Start onboarding
  1. Home
  2. Blog
  3. How to mitigate SYN Flood DDoS attacks more effectively
Security
News

How to mitigate SYN Flood DDoS attacks more effectively

  • June 30, 2022
  • 2 min read
How to mitigate SYN Flood DDoS attacks more effectively

We launch a stand-alone solution for protection against SYN Flood DDoS attacks.

In cooperation with Intel, we’ve developed an XDP-based solution (eBPF) that provides effective mitigation of DDoS attacks with little to no impact on overall latency. The new XDP-based solution eliminates the need for a dedicated DDoS protection server.

About SYN Flood

SYN Flood is a type of a denial-of-service attack that is designed to make an online network or system inaccessible by causing a flood of TCP (Transmission Control Protocol) requests to a server. The attacker sends short bursts of SYN messages into the ports leaving the connections open and available. This can exhaust the server resources and result in users being blocked from entering or using the network.

Effectiveness based on Intel processors and our CDN

To provide its customers with better protection against such attacks, we have developed a stand-alone solution based on 3rd generation Intel® Xeon® Scalable processors. This new type of solution eliminates the need for a dedicated DDoS protection server and evenly distributes volumetric attacks across CDN servers, decreasing the performance requirements for every individual CDN node.

Approved by Wargaming

We have trialed this method of protection both in test labs and alongside our customer, online gaming giant, Wargaming. To fight DDoS attacks, Wargaming adds a signature to every UDP packet from an end user’s device to the game server. We helped Wargaming to ‘offload’ the checks from their network by applying this countermeasure on our servers, so that only ‘clean’ traffic could reach the customers. When an attack occurs, all traffic with invalid signatures is routed to our servers, and only validated traffic reaches the protected gaming server.

Future of the joint solution

Such testing of XDP-based solutions for protection against SYN Flood attacks has proven successful for our customers in shared scenarios when DDoS protection suite executes on every CDN node. This perfectly suits our long-term goals and serves to facilitate our continued partnership with Intel. This case also sets an encouraging precedent for further joint testing that will ensure that our solution can always provide the best protection to our customers.

“Our long-term cooperation with Intel in developing the solution guarantees many things for the future. First of all, it’s the flexibility of the development for the customer and providing faster technical support. And secondly, it’s the possibility of further joint testing and upgrading the solution with the latest Intel processors available to us at the earliest possible stage to provide the best protection for our customers.”

Head of Cybersecurity at Gcore, Andrey Slastenov

Get server protection

Try Gcore Security

Gcore all-in-one platform: cloud, AI, CDN, security, and other infrastructure services.

Related articles

Gcore successfully stops 6 Tbps DDoS attack

Gcore recently detected and mitigated one of the most powerful distributed denial-of-service (DDoS) attacks of the year, peaking at 6 Tbps and 5.3 billion packets per second (Bpps).This surge, linked to the AISURU botnet, reflects a growing

Gcore Radar Q1–Q2 2025: three insights into evolving attack trends

Cyberattacks are becoming more frequent, larger in scale, and more sophisticated in execution. For businesses across industries, this means protecting digital resources is more important than ever. Staying ahead of attackers requires not on

No capacity = no defense: rethinking DDoS resilience at scale

DDoS attacks are growing so massive they are overwhelming the very infrastructure designed to stop them. Earlier this year, a peak attack exceeding 7 Tbps was recorded, while 1–2 Tbps attacks have become everyday occurrences. Such volumes w

Protecting networks at scale with AI security strategies

Network cyberattacks are no longer isolated incidents. They are a constant, relentless assault on network infrastructure, probing for vulnerabilities in routing, session handling, and authentication flows. With AI at their disposal, threat

Introducing Gcore for Startups: created for builders, by builders

Building a startup is tough. Every decision about your infrastructure can make or break your speed to market and burn rate. Your time, team, and budget are stretched thin. That’s why you need a partner that helps you scale without compromis

Outpacing cloud‑native threats: How to secure distributed workloads at scale

The cloud never stops. Neither do the threats.Every shift toward containers, microservices, and hybrid clouds creates new opportunities for innovation…and for attackers. Legacy security, built for static systems, crumbles under the speed, s

Subscribe to our newsletter

Get the latest industry trends, exclusive insights, and Gcore updates delivered straight to your inbox.