Protection against DDOS attacks?


Warning: count(): Parameter must be an array or an object that implements Countable in /home/styllloz/code-flow.club/qa-theme/donut-theme/qa-donut-layer.php on line 274
0 like 0 dislike
57 views
The question came up after reading the topic: 100+ Gbit/s DDoS.


At the moment this question is relevant in view of a fairly simple creation of a network of DDoS bots, but this time let's leave, it is a question of protection against these types of attacks, both in software and hardware implementation, the classification of ddos attacks and povtorus ways of protection\eflection attacks.

And one question: ways botovod for entering customer *does not take into account the hijacking bots* and what liability can threaten him under the legislation of the Russian Federation.
by | 57 views

7 Answers

0 like 0 dislike
The answer to your question only on the practical part of the protection against BTC for a nice surprise pulls a small book, well, or time report on the hayload =))
by
0 like 0 dislike
Thank you all for the replies, so to sum up temporarily:
We have several types of attacks, one of which is DOS themselves web applications and services, *as for example, suppose the old, but still (you need a recent example, leads) www.securitylab.ru/vulnerability/203865.php * software upgrade Scripts.
Further, when a small attack we can use as a kind of software, web services for creating and generating firewall rules and .htaccess, for example: ipinfodb.com/
\r
IPinfoDB is a monthly updated database of IP address ranges that are bound to different countries, then you can quickly see which country owns a particular IP, within the service there are a few built-in tools for generating firewall rules and .htaccess by which you can block access to the server geographically. If you need to quickly reflect an influx of bots from China or any where else, this is a very good helper.

like making the rules, writing scripts forum.antichat.ru/thread128581.htmlgenerally to be honest that helped me on this section acute: AntiDDos — Antiddos...
\r
to: lafayette > almost, but there is an option to hijack the network\\subnet bots, regarding the article, Yes up to 3 years, but I think some more can be added, vplod to satara.
\r
to: BasilioCat> I would like to listen, to read, to see the presentation and let the theoretical implementation.
\r
to: xsash>
1) if the site dositeja on ordering it turns out admin site is no negotiation mood this is only possible if there is the original purpose for which the work of online important, if the order is not who will get in touch.
2) I already wrote in the topic which is hidden, that the maximum of searching and calculating to 1-2 client machine which fed the team and which thus infected and is the SOx server, so in this case, the best option to steal himself a botnet.
3-4 I think it is possible to combine, it turns the monitoring sites underground themes which offer these services, and where is the guarantee that it will not be posturing.
\r
to: savostin > that's exactly what you imagine as classifications of a few attacks, in fact I would like to hear not one answer, and attack protection that this combination don't you understand?
\r
to: prox > necessarily this afternoon read, thank you.
\r
*I think a couple of days to summarize,*
by
0 like 0 dislike
Keep track of the customer it's almost impossible for it and its relative ease of use of such kind of attacks and explain their popularity... Except that the customer himself "slept", which is unlikely.
And article 273 of the criminal code, they face at least.
by
0 like 0 dislike
On the subject of law — the main 3 articles on access to computers... and for the severity soldered extortion/fraud
\r
Sleep when you can
1) the receipt of money for ordering (if the "control purchase"/to burn the customer and will extort the admin of the site)
2) when applying to the control center bots (if it will calculate and take control)
3) leave the contacts can be associated with a living person (mail, icq, jabber), or which can be viewed by third parties
4) to wag a lot of the language
by
0 like 0 dislike
For starters, I think we need to understand what is required as a "protection from attack"?
It seems everyone has their own vision of this issue...
by
0 like 0 dislike
by
0 like 0 dislike
We (ddos-guard.net) on the basis of its long-standing practice of anti-DDoS protection we can give some actual recommendations.
1) the Reality is that protection in one point of presence(POP) sense. Virtually no bots now attack the most popular technology - DNS amplification attacks which reach 130-150Gbps, but the average value of the spherical attack the vacuum for this type of attack is around 30Gbps, which is much more than the usual webmaster/hoster can filter.
2) But even if the publisher/hoster wants to spend several thousand dollars on infrastructure to 30Gbps, as it can fly 50Gbps, and this would negate all the efforts. Conclusion - use of specialized services that spend a lot of money on the maintenance and development of its geographically distributed infrastructure.
3) For hosting the best solution is a secure IP transit network when it announced the defense from DDoS and it comes already cleaned traffic.
4) you should Never pay Blackmailers attacking you is like bargaining with terrorists, giving them money you will be charged more than once.

If you need advice on any particular case, please ask a question here or on support@ddos-guard.net will help.
by

Related questions

0 like 0 dislike
7 answers
0 like 0 dislike
4 answers
0 like 0 dislike
4 answers
0 like 0 dislike
4 answers
0 like 0 dislike
4 answers
110,608 questions
257,186 answers
0 comments
23,467 users