Smart router instances effectively prevent DDOS attacks

Source: Internet
Author: User

This article mainly analyzes the current DDOS attacks. How can we prevent them now? The following article will give us a detailed answer. After reading this article, we can provide a detailed reference.

Just as the global climate is unpredictable due to environmental changes, enterprise network security threats are becoming increasingly complicated. In this complex dark stream, Dos attack routers have become the mainstream. For now, it is still difficult to defend against DoS attacks. However, even if it is difficult to prevent, it does not mean that we should take it against it. In fact, it is not absolutely impossible to prevent DoS. The users of enterprise networks are various, and they struggle with DoS all the time. Different roles use different methods to prevent them.

Analysis

We know that routers are portals to enterprises. It has been some time since they became targets for hackers. Today, hackers seem to be more savvy. They often find that the locked target's front door is locked, and the door to the vulnerability is opened. Vro attacks attract hackers for several reasons: Unlike computer systems, vrouters are usually in the internal infrastructure of enterprises. Compared with computers, they are relatively weak under the protection of monitors and security policies, provides a hidden place for attackers. If the vro is improperly configured, the default password provided by the vendor may be too simple to enter the internal network of the enterprise. Once compromised, A vro can be used as a platform for scanning and spoofing connections, and as a stepping stone for launching dos attacks to realize the intention of a hacker's network attack.
So how should we adopt appropriate policies to defend against DOS attacks? Although network security experts are focusing on developing devices to prevent DoS attacks, the results are not very satisfactory because DoS attacks use the weakness of TCP protocol. We can use the correct configuration of enterprise-level routers and other related tools for detection to effectively prevent DoS attacks. Now we take the Huawei 3COM router as an example. The Huawei 3COM router already has many DoS protection features to protect the security of the router itself and the internal network of the enterprise.

Create an access list based on Detection

Extended access list is an effective tool to prevent DoS attacks. It can be used to detect the type of DoS attacks and prevent DoS attacks. The Show access-list command displays matching data packets for each extended access list. Based on the data packet type, you can determine the DoS attack type. If a large number of TCP connection requests occur on the network, it indicates that the network is under SYN Flood attack. In this way, you can change the access list configuration to effectively prevent DoS attacks. I
 

 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.