Back to Blog

Why Attackers Target Peak Events

DDoS attacks during peak traffic events are not random. They are timed for maximum impact, maximum leverage, and maximum pain. An attacker who takes down an ecommerce platform on a random Tuesday in February causes an inconvenience. The same attacker taking down that platform at 9 AM on Black Friday causes a catastrophe.

The economics are straightforward. The cost of downtime during a peak event is orders of magnitude higher than during normal operations. An ecommerce site generating $500,000 per hour on Black Friday loses $8,333 per minute of downtime. A game studio launching a title that 2 million players are waiting to access loses player trust and generates a wave of refund requests if the servers are down for the first hour. A live streaming platform carrying a pay-per-view event with 500,000 concurrent viewers cannot tell those viewers to "try again later."

Attackers exploit this urgency in three primary ways:

  • Extortion: The attacker contacts the target before the event and demands payment to not attack. The implicit threat is credible because the target knows that any downtime during the event will cost far more than the ransom. Many targets pay, which funds further attacks against others.
  • Competitive sabotage: A competitor pays for a DDoS attack against a rival's infrastructure during the event. If both companies are running Black Friday sales and one of them is unreachable for two hours, the other absorbs a significant portion of the lost revenue. This is illegal but difficult to prove and more common than the industry acknowledges.
  • Ideological or reputational targeting: Activist groups, disgruntled employees, or threat actors with a grudge time their attacks for maximum visibility. Taking down a major platform during a high-profile event generates news coverage and social media attention that amplifies the attacker's message.

The concentration of value in peak events creates a concentration of risk. Every organization with a high-stakes event on the calendar needs to treat DDoS protection for that event as a separate planning exercise, not an extension of everyday monitoring.

The False Positive Problem

Here is the paradox that makes peak event DDoS protection uniquely challenging: the legitimate traffic surge during a peak event looks remarkably similar to a DDoS attack to most detection systems.

Consider a game server hosting platform on launch day. Normal daily traffic might be 50,000 concurrent players generating 200 Mbps of aggregate traffic. On launch day, 500,000 players try to connect simultaneously, generating 2 Gbps. That is a 10x spike in traffic volume, which is exactly the kind of anomaly that DDoS detection systems are designed to flag.

A static threshold configured to alert at 500 Mbps (2.5x normal) will fire instantly on launch day — not because of an attack, but because the event is successful. The NOC now faces an impossible decision: is this a DDoS attack or is this the launch traffic we expected? If they trigger mitigation, they block paying customers. If they do not, and it turns out to be a real attack, the infrastructure goes down.

# The false positive trap during peak events

Normal day:    ████████░░░░░░░░░░░░░░░░░░░░  200 Mbps
                                               (baseline)

Launch day:    ████████████████████████████░░  2,000 Mbps
                                               (legitimate surge)

Attack during  ████████████████████████████████████████  3,500 Mbps
normal day:                                    (obvious anomaly)

Attack during  ████████████████████████████████████████  3,500 Mbps
launch day:                                    (only 75% above
                                                launch-day traffic)

Static threshold at 500 Mbps:
  Normal day → no alert (correct)
  Launch day → ALERT (false positive!)
  Attack on normal day → ALERT (correct)
  Attack on launch day → ALERT (but was it already alerting
                          from legitimate traffic?)

This is not a hypothetical scenario. It happens every major shopping season, every major game launch, and every major live event. NOC teams spend peak events trying to distinguish real attacks from legitimate traffic surges, often with insufficient data and under extreme time pressure. The cost of getting it wrong in either direction — blocking customers or ignoring an attack — is measured in millions of dollars.

Dynamic Baselines That Adapt to Expected Surges

The solution to the false positive problem during peak events is detection that understands context. Dynamic baselines maintain a continuously updated model of what "normal" looks like for each monitored node. When the baseline is properly configured, it adapts to expected traffic patterns — including the massive surges that accompany peak events.

There are two mechanisms that make this work in practice.

Automatic Baseline Adaptation

Dynamic baselines using exponentially weighted moving averages (EWMA) naturally absorb gradual traffic increases. As launch-day traffic ramps up over the first 30 to 60 minutes, the baseline rises with it. The detection system recognizes that the new traffic level is the current normal and adjusts its anomaly thresholds accordingly. A DDoS attack that arrives during the event must exceed the elevated baseline, not the off-peak baseline, to trigger an alert.

This works well for events where traffic ramps up gradually. Black Friday traffic, for example, typically builds over several hours as time zones move through morning shopping hours. The baseline has time to adapt. But for events with sudden onset — a game launch at a specific minute, or a live broadcast starting at a scheduled time — the traffic jump can be too abrupt for automatic adaptation. The baseline needs additional context.

Protocol-Level Classification

Even when total traffic volume is ambiguous (is this surge legitimate or an attack?), the protocol composition often tells the story. Legitimate Black Friday traffic is predominantly HTTPS (TCP port 443) with some DNS (UDP port 53) and HTTP (TCP port 80). A UDP amplification attack during Black Friday shows up as a sudden spike in UDP traffic from port 123 (NTP) or port 389 (CLDAP) that has no correlation with the ecommerce traffic pattern.

Flowtriq's per-node agent classifies traffic by protocol in real time. During a peak event, the agent can distinguish between a legitimate traffic surge (elevated TCP/443 from diverse residential source IPs) and a DDoS attack (elevated UDP/53 from a concentrated set of reflector IPs) even when the total bytes-per-second number is ambiguous. Protocol-level detection remains effective regardless of the volumetric baseline because attacks use fundamentally different protocols than legitimate application traffic.

The key principle: during peak events, lower your sensitivity to volumetric anomalies but keep protocol anomaly detection tight. A 10x increase in HTTPS traffic is expected on Black Friday. A 10x increase in inbound UDP from port 123 is never expected, regardless of what day it is.

Pre-Event Checklist

If you have a peak event coming up, start preparation at least two weeks before the event date. The following checklist covers the critical items that determine whether your DDoS protection helps or hurts on event day.

1. Test Your Mitigation End-to-End

Do not assume that your mitigation pipeline works because it worked six months ago. Run a controlled test. Generate synthetic attack traffic (or hire a legitimate load testing service) and verify that the full chain — detection, alert, mitigation activation, traffic scrubbing, clean traffic delivery — functions correctly. Measure the time from attack start to mitigation active. If it exceeds your tolerance for downtime during the event, fix the bottleneck now.

Common failures discovered during testing include expired BGP sessions with scrubbing providers, FlowSpec rules that are accepted but not actually applied due to policy conflicts, and webhook integrations for alerting that have rotated API keys. Any of these will cause a silent failure during a real attack.

2. Pre-Stage Scrubbing Capacity

If you use an upstream scrubbing provider, contact them before the event and pre-stage your prefixes for scrubbing activation. Some providers can enable "always-on" scrubbing for the event period, where all traffic passes through the scrubbing infrastructure continuously. This eliminates the delay between attack detection and scrubbing activation because the traffic is already being scrubbed. The tradeoff is a small increase in latency from the additional network hop through the scrubbing center.

For providers that use on-demand scrubbing (BGP-triggered diversion), ensure that the BGP sessions are active and tested, that the diversion can be activated automatically by your detection system, and that the scrubbing center has reserved capacity for your event. Major shopping seasons see high demand for scrubbing capacity, and providers may not be able to accommodate last-minute requests.

3. Tune Detection Sensitivity

Adjust your detection parameters for the event period. The specific adjustments depend on your detection system, but the general principle is: relax volumetric thresholds while tightening protocol anomaly detection.

  • Volumetric thresholds: If your normal PPS threshold is set to alert at 3x baseline, consider raising it to 5x or 8x for the event period. This gives the legitimate traffic surge room to grow without triggering false alerts.
  • Protocol anomaly thresholds: Keep these unchanged or even tighten them. A spike in UDP amplification traffic is not legitimate regardless of whether it is Black Friday. If anything, you want faster detection during the event because the cost of unmitigated downtime is higher.
  • Source diversity thresholds: Legitimate peak event traffic comes from a diverse set of residential and mobile source IPs. Botnet traffic comes from a different distribution. Source diversity metrics can help distinguish the two even when volume is ambiguous.

4. Brief Your NOC

Every person who might be involved in incident response during the event needs to know: what traffic levels to expect, what the escalation procedures are, who has authority to activate mitigation, and what the decision criteria are for distinguishing legitimate surges from attacks. Write a one-page runbook specific to the event and distribute it to everyone on the rotation.

Ensure that contact information for your upstream provider, scrubbing center, and any external DDoS mitigation partners is current and tested. During a peak event attack, you do not want to discover that the emergency contact number for your scrubbing provider routes to a voicemail system.

5. Prepare Rollback Procedures

If mitigation is activated and it turns out to be a false positive (you accidentally started scrubbing legitimate traffic), you need a fast rollback procedure. Document how to deactivate scrubbing, remove FlowSpec rules, or withdraw RTBH announcements. Measure the time each rollback takes. During an event, every minute of incorrectly applied mitigation is a minute of degraded customer experience.

Real-World Peak Event Attacks

The pattern of attacks targeting peak events is well-documented across multiple industries. Understanding how these attacks unfold helps inform preparation.

Game Launches

Game launches are among the most frequently DDoS-targeted events. The attacker's motivation ranges from extortion to competitive griefing to simple notoriety. Multiple major game launches in 2025 and 2026 experienced sustained DDoS attacks during their first hours of availability. In several cases, the attacks combined volumetric UDP floods against the game servers with application-layer attacks against the authentication infrastructure, forcing players into queue systems or disconnecting them mid-session.

The challenge for game server operators is that launch traffic is inherently bursty and difficult to predict. Pre-orders and marketing campaigns give an estimate of demand, but the actual concurrency spike can exceed projections by 2x to 5x. Detection systems must accommodate this uncertainty without creating a window where attacks go undetected.

Black Friday and Ecommerce

Ecommerce DDoS attacks during shopping seasons follow a predictable pattern. The attacker sends a ransom demand days before the event, threatening to attack if payment is not made. If the target does not pay (and they should not pay — it only encourages further attacks), the attack begins during the highest-traffic hours. The most sophisticated campaigns use multi-vector approaches: a volumetric flood to saturate bandwidth, combined with an application-layer attack targeting the checkout flow or payment processing endpoints.

The financial impact is immediate and measurable. Lost sales, abandoned carts, and customer trust erosion compound with every minute of downtime. An ecommerce platform that experiences even 30 minutes of degraded performance on Black Friday may see effects on conversion rates for the rest of the shopping season as customers shift to competitors they perceive as more reliable.

Live Streaming and Broadcasts

Live events are uniquely vulnerable because the content is time-sensitive and cannot be replayed. A viewer who misses a live broadcast due to a DDoS attack on the streaming platform cannot "come back later" for the live experience. This makes live events particularly attractive for extortion because the organizer has zero tolerance for downtime during the broadcast window.

Attacks on streaming platforms often target the ingest infrastructure (the servers receiving the live video feed from the production facility) rather than the CDN edge. Taking down ingest affects all viewers simultaneously and cannot be mitigated by CDN failover. Protecting ingest infrastructure requires dedicated DDoS protection that accounts for the unique traffic profile of video ingest streams.

Post-Event Review

After the event, whether or not an attack occurred, conduct a review. If an attack happened, analyze the detection timeline (how quickly was it identified?), the mitigation timeline (how quickly was mitigation activated?), the false positive rate (were any legitimate users affected by mitigation?), and the overall impact (was there measurable downtime or performance degradation?).

If no attack happened, review the detection system's behavior during the legitimate traffic surge. Did any false positives fire? Did the baseline adapt appropriately? Were there any near-miss situations where the NOC had to manually intervene to prevent false mitigation? These findings inform tuning for the next event.

Document everything. Peak events recur. Black Friday happens every year. Game studios launch new titles regularly. The lessons from this event become the preparation foundation for the next one. Build a peak event DDoS playbook that grows with each iteration, capturing the specific detection thresholds, mitigation configurations, and NOC procedures that worked (and the ones that did not).

Dynamic baselines for peak events. Flowtriq's per-node baselines adapt to traffic surges automatically, so Black Friday volumes are recognized as normal — not flagged as an attack. Protocol-level detection stays sharp regardless of volume. Start your free trial and protect your next peak event without the false positive risk.

Back to Blog

Related Articles