So, in one breath, you talk about a $1e9 enterprise, and in the next, you're talking about a start-up.
Exactly. This is one of Big Challenges I have with this book (and it indeed often brings me at the edge of MPD as in "Multiple Personality Disorder" ): everybody wants to start small, and to end up big (and to make things worse, I cannot blame them for that, it is a perfectly natural desire). So I need to describe a path which starts from dirt cheap rental servers, and goes all the way to $1e9 enterprise with multiple Telehouse-hosted ISPs, swimming pools, and headquarters on Bahamas (all that without rewriting the whole thing from scratch). Which is possible, I've been a part of it myself. On the other hand, techniques used at each of the stages, vary greatly across the industry, so I'm always eager to hear about real-world experiences (which tend to be very different from marketing materials each and every vendor is throwing at you ).
Unfortunately, they come with enterprise contracts that may prevent me from talking too much about them, but I can talk in general.
Thanks a LOT!
The vendors I know from some level of detail are Verisign, Neustar, and Akamai.
The guy from whom I've heard about these things, told about the game successfully using F5 Sliverline, but wasn't able to provide any details beyond BGP redirection and tunnel (it wasn't his scope).
We have not measured additional latency. I'd expect dozens but not hundreds of milliseconds.
Are you sure about it (for quite a few games out there, the difference between dozens and hundreds will be a deal-breaker)? It would require the vendor to be really close to your ISPs (though as they have worldwide presence, it should be possible too). Did you notice how far their BGP redirection gets you (in terms of hops, or kilometers, or whatever else)?
Return traffic typically does not go back through them.
Do you know if it also applies to TCP? IIRC, TCP attack mitigation (beyond SYN floods, which are a very different and unpleasant story) is much more efficient if they know about outgoing packets (basically, they can filter out all the non-SYN out-of-existing-connection traffic as illegitimate).
The cost for DDoS mitigation is some amount of yearly costs (thousands per month) and that includes some amount of mitigation events per year (an event might be defined differently per vendor.) Additional events cost additional money, on the order of a some thousands per.
This sounds as not too much starting from, say, some-Gbit/s outgoing traffic (well, that's assuming that "thousands" are more like "single-digit thousands" and less like "hundreds of thousands" ).
Curiously, the bigger you are, the less "nuisance" attacks you see, because your ingress is big enough that the small DDoS-es don't actually affect you.
Yep, I've seen it too. OTOH, it means that you need to handle these small-scale nuisance attacks yourself (so that the small-scale attack doesn't cause service interruption, or the need to initiate the "event" which is expensive, disruptive, etc. etc.).