Scenario Video Demo When server suffers from hacker DDoS attack

Source: Internet
Author: User
Keywords Security server

Taiwanese and Filipino hackers have been attacking each other's government websites recently because Taiwanese fishermen have been killed by the Philippines, and there are no DDoS attacks in these attacks, but this article is not about what is happening in front of us. Many people should have used vlchttp://www.aliyun.com/zixun/aggregation/10244.html "> Video player, a good software, and the recent DDoS attack is the company that developed the software.

First, explain what a DDoS attack is. Wikipedia explains:

Distributed denial of Service attacks (English: Distributed denial of service, abbreviation: DDoS) also known as flood attacks. As the name suggests, that is, the use of the network has been compromised computer as a "zombie" to a specific target computer to launch an intensive "denial of service" attacks to the target computer network resources and system resources exhausted, so that it can not be able to provide services to truly normal users. Hackers make a zombie network by "zombie" or "chicken" can launch large-scale DDoS or SYN flood network attacks, or the "zombie" group together to carry out the benefits of the brush site traffic, email spam mass, paralysis of the intended target employed to attack competitors and other commercial activities.

According to VideoLAN's employee, Ludovic Fauvet, the server on which the get.videolan.org was downloaded requested up to 400 times per second-plus nearly 60GB of downloads per second. What is this concept? As you can see, the massive DDoS attacks that have been dragged down by Wikipedia are roughly 10GB per second.

Thanks to the VLC video player development company's responsible security staff, we now have a chance to see what DDoS attacks are like. Here is the attack-side record:

Security software quickly identifies the rate it was an attack, and Fauvet and his colleagues quickly blocked the hackers ' access.

By identifying some seemingly mundane user features, they adjusted the Nginx server configuration to allow their request connections to be ignored. As a result, these DDoS attack requests have no effect other than an HTTP 403 error.

(Author: Wang Editor: Wang)
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.