DDOS News

Friday, January 17, 2014

How to Stop DDOS Attacks

Experts have the following advice on how to stop a DDOS attack:


Your plan should include analysis of the lost time and money a DDOS attack would cost your organization. That will help you determine the correct level of protection.

Many companies also use a DDOS protected server as part of their plans on how to stop DDOS attacks.

It's also critical to have a plan ready covering how to stop a DDOS attack before one happens -- and make sure the team is clear on how to respond.

Some specific steps on how to stop DDOS attacks from US CERT:

  1. Implement router filters as described in Appendix A of CA-96.21.tcp_syn_flooding, referenced above. This will lessen your exposure to certain denial-of-service attacks. Additionally, it will aid in preventing users on your network from effectively launching certain denial-of-service attacks.
  2. If they are available for your system, install patches to guard against TCP SYN flooding as described in CA-96.21.tcp_syn_flooding, referenced above. This will substantially reduce your exposure to these attacks but may not eliminate the risk entirely.
  3. Disable any unused or unneeded network services. This can limit the ability of an intruder to take advantage of those services to execute a denial-of-service attack.
  4. Enable quota systems on your operating system if they are available. For example, if your operating system supports disk quotas, enable them for all accounts, especially accounts that operate network services. In addition, if your operating system supports partitions or volumes (i.e., separately mounted file systems with independent attributes) consider partitioning your file system so as to separate critical functions from other activity.
  5. Observe your system performance and establish baselines for ordinary activity. Use the baseline to gauge unusual levels of disk activity, CPU usage, or network traffic.
  6. Routinely examine your physical security with respect to your current needs. Consider servers, routers, unattended terminals, network access points, wiring closets, environmental systems such as air and power, and other components of your system.
  7. Use Tripwire or a similar tool to detect changes in configuration information or other files.
  8. Invest in and maintain "hot spares" - machines that can be placed into service quickly in the event that a similar machine is disabled.
  9. Invest in redundant and fault-tolerant network configurations.
  10. Establish and maintain regular backup schedules and policies, particularly for important configuration information.
  11. Establish and maintain appropriate password policies, especially access to highly privileged accounts such as UNIX root or Microsoft Windows NT Administrator.

1 comment:

  1. The way the internet works, it has a pretty serious vulnerability, DDoS attacks. Hosts communicate between each other and exchange data, which in practical applications is great, it lets you refresh your social media pages, watch cat videos, and even read this article. However there is a serious flaw, as stated by DDoS Protection because each host must process ALL incoming data, it becomes possible for us to overload it with useless junk data (AKA DDoS Traffic).

    ReplyDelete

Search This Blog