I've encountered several DDOS attacks in my network. The more interesting fact was thatattacking device was Mikrotik RouterOS itself. I've successfully reproduced problem and confirmed that causative device was MT router....
Configuration:
RouterOS v5.20 on x86 platform,
around ten gigabit ethernet interfaces, lots of VLAN, running HotSpot
How to reproduce problem?
1. Configure Hotspot system
2. Go to Hotspot IP Bindings and add some static IP (of course in same subnets of RouterOS device) andvery important- set static MAC address and type: bypassed. You can connect some working device (like other router) and set it's IP and MAC.
3. Now, go to Tools->Ping and PING previously added IP. It should respond and nothing spectacular should happen at this point.
4. Now -disconnect/poweroff this device, so it shouldn't be reachable by RoutetOS. Wait around 2 or 3 minutes, and retry pinging.As RouterOS couldn't reach this device, for some reason IT WILL BE FLOODING all interfaces - including ethernets, vlans etc with _BROADCAST MAC_ ADDRESS, and in response all devices will be flooding RouterOS itself with icmp type8 (echo-ping) in response to broadcast packet. This causing lots of problems-overloaded devices, slow network performance, and in some cases also server overload)
Same problem might be reproduced not with ping, but also with TCP connection... for example if you will try to connect to non-reachable IP added at IP binding to ssh or www port, server will flood all ports with SYN packets, and all devices will respond to broadcast-syn packets...
Workaround is to not use MAC address in IP binding, however i think problem should be investigated by MT engineers.
Best regards.