well if the ddos is consuming your pipe then there is nothing litespeed can do. Only way it can really bring it down is from php/mysql usage due to get attacks.
But here is what to do, George showed me these settings the other night but first you need a firewall like
CSF Make sure you enable connection tracking on it.
For litespeed put
Static Requests/second 10
Dynamic Requests/second 1
Connection Soft Limit 5
Connection Hard Limit 20
Grace Period (sec) 30
Banned Period (sec) 3000
You still need a firewall but these settings here will help tons.
Also make sure your users are running suphp so php processes dont go crazy. You can limit per user php processes to prevent from using all the resources on the server.
Do this, install the firewall (CSF) set ct_limit to about 60, interval to 30, and permanent ban to 1 And it will help clear it up. Then you can pretty much handle all you can pipe to it
BUT, sometimes the default kernel values for tcp are low and some attacks can hit limits to where the kernel starts dropping packets. If you see any messages about running out of socket memory or dropping packets on dmesg then you need to tune your tcp stack. I will post a tut on that here soon but you can find lots of info on the net about it and its resource sensitve, you can only allocate what you have memory for