How to prevent Dos attacks

Source: Internet
Author: User

First of all, to strengthen the security of each network user awareness, installation anti-virus software, installation software or hardware firewall, not from the site download software, do not visit some sites, do not open mail, try to avoid the cultivation of Trojans.

Secondly, the National legislative unit, the legislation on cybercrime, the transmission of viruses, trojans, and the conduct of hacker attacks to qualitative, and law, to protect the national information high-speed network platform security, for the domestic information construction escort.

Again, our operators have the obligation in the network platform upgrade and construction process, effectively in each node to resist hacker malicious attack behavior, to purify our network. Not only to strengthen can see the benefits of the terminal platform, such as IDC engine Room anti-DDoS protection, but should be in the network of each node to strengthen protection, especially in the access side for DDoS protection and source address detection, so that hackers host or occupy the "broiler", can not pull up a large number of bandwidth Effectively record the network behavior of various users (especially Internet café users) and establish electronic files to assist the Ministry of Public Security to investigate cyber crimes and provide evidence for the testimony of crimes.

For some of our network operating platform users, such as operating Web sites, portals, online trading platform, network game providers, Internet cafes, VoIP providers, etc., but also to strengthen the network export protection, discovery and proof of attack behavior, do a good job logging, and the use of hardware protection equipment, the greatest degree of reduction of hacker attack harm, Ensure the normal operation of the operating platform.

The network of our enterprises and institutions, although not like the operating network, has become the focus of hacker attacks, but there may be "accidental injury" phenomenon, such as with an Internet café in a carrier's router, or hackers get the IP address is not accurate, at present such network events are also many. Therefore, in the design of the new network, protection of DDoS, should also become the focus of enterprise network security protection, at the same time, in the Enterprise network planning, how to prevent their own internal host and server to avoid becoming hackers "broiler", but also in the new situation of enterprises in the protection of a key issue, the need for our corporate network to truly
1 effective protection of the internal host to avoid becoming a hacker's "broiler"
2 when the internal host becomes "broiler" can soon be found, and in a very quick time to kill the control program
3 "broiler" attack and transmission of the rapid alarm, cut off its attack and transmission channels, at the same time, does not affect the export bandwidth and the normal use of internal other host network.

Therefore, in the protection of DDoS and hacker attacks on the issue, ask our public security organs, operators and network security vendors, and users of the network, in recognition of the seriousness of the network attack problem, under the premise of a multi-party cooperation, together strengthen the security of our network platform constructive, purify our network, do not give hackers to survive the attack, Guarantee our more than 10 years of information network platform construction results, for China's economic construction to provide a strong and secure network information platform.

In the network security vendors, for the dedicated anti-DDoS equipment, many manufacturers are also involved in the development of a number of new equipment, the majority of the current focus on the solution IDC Room mainframe protection.

In fact, through the above research, we know that to completely eradicate DDoS and hacker attacks, the source of attacks, access nodes and some backbone nodes is the focus of protection, at this level to do a better manufacturer is not a lot, for example, Datang Lung Chong Company, Datang Dragon Company in the Access node DDoS There is a good solution to the protection. Expanded its DDoS protection product line, for operators to provide "Access node" hacker attack protection, while protecting the access to bandwidth, so that hackers and hackers occupy the "chicken" can not be played, nowhere to hide, from the source to solve the current rampant hacker DDoS attack problem.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.