Website was attacked what to do to make a good solution is the way to develop

Source: Internet
Author: User
Keywords Attack believe good solution

Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall

I believe we all know more famous home of a webmaster, it and A5 like a portal, there is a forum, is a lot of webmaster exchange learning places. Of course, webmaster home than A5 more than the same webmaster query tools, now is also a lot of webmaster in the use of tools. All along, Webmaster's home of this webmaster tools are very stable open. However, from June 24 to June 115.html ">26 Day, the continuous occurrence of open." For a whole day or two, it was not a problem with the tools of the webmaster's house, but was attacked.

Webmaster's home from the webmaster tools are attacked, let the author Lenovo to the importance of website maintenance. Because the Internet competition is more and more big, many website stationmaster because cannot surpass the family, but wants to go out attacks the person's website the method. For some do the site to do better webmaster, worry about the problem is to be attacked by others.

Like Ali slightly before the server was attacked, resulting in a lot of space merchants do not dare to accept them, so let Ali slightly also closed a period of time, after the solution, but I believe it must have cost a lot of money.

The situation of the website being attacked

1. Website attack phenomenon

In general, the site is attacked we will find the page garbled, open the phenomenon, the severity of the server will crash.

2. Impact of Web site attacks

Site rankings disappear, snapshot back, visitors lost, let your site completely back before liberation.

Second, the way to attack the site,

Now there are 3 kinds of attacks on the network, such as ARP attack, CC attack, DDoS attack, etc.

1. ARP Attack description

If the other site ARP attack, the first to have and others site is the same room, the same IP, the same VLAN server control. Intrusion mode attack, as long as the control, camouflage controlled machine for the gateway spoofing target server. This attack is typically a Web page that dives into some code to intercept, giving the username and password.

2. Treatment mode

Inform the machine room to handle the controlled machines.

Ii. cc attack

The harm of CC attacks is slightly larger than this. The general cc attack appears to be the service unavailable. Attackers use the control machine to continuously send access requests to the attacked Web site, forcing IIS to go beyond the limit, so that the CPU bandwidth is exhausted, to the end, the firewall crashes, operators will generally seal this attack IP.

For CC attacks, there is generally a software space to prevent CC attacks, leased on many VPS servers, this machine will have a good effect on the anti-CC attack.

Iii. Traffic attack

If it is a DDoS attack, the most dangerous. The principle is that the target site to send a large number of packets, occupy its bandwidth.

Solution: The general bandwidth Plus firewall is not used, must be a combination of firewall and bandwidth to defense. Traffic attacks are different, you set up a firewall open resources are also different. For example, 10G traffic to 20G hardware firewall plus 20G bandwidth resources.

Summary: The website is attacked is inevitable in the development of the website, the website operator should be appropriate to understand the phenomenon that the website is attacked, through the related attack formulation processing method is the website long-term development key. This article by: Inspirational World http://www.lztxw.com provide, reprint please indicate the source, thank you.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.