Network security-DDoS Attack and Defense

Source: Internet
Author: User

Background: There are many types of DDoS attacks, including traffic attacks that consume network bandwidth and application layer attacks that consume server resources. Which has a huge impact and makes large companies and small companies "awe-inspiring" Traffic attacks. Today, when traffic is getting cheaper, the attack traffic is several hundred megabytes, while the attack traffic is several GB, or even more. The hardest hit by DDoS attacks is generally in the highly competitive gaming industry, especially when private servers became popular in the past few years.

 

Common defense methods:

1. enterprise-level DDoS firewall: it has used DDoS firewalls from many manufacturers, such as yundun, lumeng, and AO shield. These firewalls are similar in principle and basically have powerful counting timers, then we can defend against the attacks based on the characteristics of the TCP/IP protocol family. For example, the number of SYN semi-open connections generated per second is an attack, and the number of ICMP traffic generated per IP per second is an attack, there are also some protocols that carry some special bytes starting from those bits, and so on. The defensive effect for some attacks with a small amount of traffic is quite obvious.

2. Carrier-level DDoS protection: only carriers can defend against traffic-heavy attacks, and operators have greater network resource advantages. Carriers generally provide two defense methods: one is to directly block IP addresses, such as using rtbh technology, and the other is to clean IP traffic, for example, Shanghai provides traffic cleaning services in a quad-core environment, which many banks and Internet companies prefer.

 

Common DDoS firewall deployment methods, such:

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/45/B2/wKioL1PptT_BJEqYAAEue6eTssM539.jpg "Title =" dd.png "alt =" wkiol1pptt_bjeqyaaeue6etssm539.jpg "/>

1. directly connect to the network on the left side. In this case, all IP addresses and services can be protected at any time.

2. In the case of the right side, the bypass mode is used to complete network drainage, cleaning, reinjection, and other functions. In this case, only anti-DDoS protection is required, which is flexible.

 

Here are several examples of previous processing:

1. UDP traffic attacks are also common attack methods.

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/45/B1/wKiom1PptEeANaMlAAfCv9z5Msc072.jpg "Title =" qq20140812135720.png "alt =" wkiom1ppteeanamlaafcv9z5msc072.jpg "/> 650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/45/B1/wKiom1PptGLBVTmZAAXr43wL2OI366.jpg "Title =" 58.png" alt = "wkiom1pptglbvtmzaaxr43wl2oi366.jpg"/>

It can be seen that there was a large amount of UDP Attack traffic in an instant. Because the source IP address is relatively fixed, the source IP address is directly blocked, but the source IP address is usually not fixed, in order not to affect others, only the destination IP address is blocked.

2. ICMP traffic attack

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/45/B2/wKioL1PptcjQdOO2AAtlJO7QGZA833.jpg "Title =" ddddd.png "alt =" wkiol1pptcjqdoo2aatljo7qgza833.jpg "/>

3. Syn Attack

650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/45/B2/wKioL1PpthTxD_aiAAYv7ItHf2g198.jpg "Title =" ds.png "alt =" wkiol1ppthtxd_aiaayv7ithf2g198.jpg "/>

I remember that the SYN attack traffic lasted for a few hours, but basically it was intercepted by the DDoS firewall and no IP address was blocked. Now the DDoS firewall is very mature, generally, traffic attacks and SYN attacks are well protected.

 

Below: DDoS attacks are far from complete, the source is difficult to trace, and the attack cost is very low. The rest may be passive. How can we effectively solve these problems in the future: Using CDN? Use SDN? Or use future networks such as FIA and Xia?


This article from the "the brightest star in the night sky" blog, please be sure to keep this source http://wangxl.blog.51cto.com/621714/1538982

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.