If the maliscious traffic continues then depending on the type of attack we will mitigate it in certain ways. Usually the attack is stopped at the start meaning you don't even notice it
But if the attack is large enough our in house system boots on stopping the bad traffic from continueing. While all this is happening you might not even notice while your playing on your server.
Abnormal traffic flows are indentified.
The traffic is redirected.
DDoS traffic is weeded out while clean traffic is passed on.
Securtiy logs are used to improve resilience.