An attacker tweaks xerxes by setting the number of CONNECTIONS in xerxes to 1 instead of 8, like so:
#define CONNECTIONS 1
They then attack with xerxes-executable mydomain 433.
Their strategy is to use eight time less connections from each attacking IP / machine
and to launch a distributed attack from the eight times larger number or machines.
Does rate-limiting in nginx.conf has any sense in the case of such attack?
How might I rate limit such adversary in nginx.conf?
What are other manual ways of mitigating such attack?
In what way the connections of the attacker stand out, having in mind not only mitigation but also forensics, in comparison with the regular requests?