Preface
As in the real world, the Internet is full of intrigue. Website DDoS attacks have become the biggest headache for webmasters. In the absence of hardware protection, finding a software alternative is the most direct method. For example, iptables is used, but iptables cannot be automatically blocked and can only be manually shielded. Today we are talking about a software that can automatically block the
suddenly rise, looked at the ranking, "Wu Move the Universe" This word incredibly to the Baidu home page, so in the article inserted links, many sites to collect, get a lot of outside the chain.
By March, the site incredibly to the second home page Baidu, although only persisted for three days, immediately fell to the fifth, but those days every day has 100,000 IP, at that time cut a map (with the plug-in of shielding ads, so no promotional links).
TCP connection:
1 Webuià high-grade equipment à group, set up a team "all" (can be customized title), including the entire network segment of all IP address (192.168.0.1--192.168.0.254).
Attention: Here the user LAN segment is 192.168.0.0/24, the user should be based on the actual use of IP address segment for group
This article introduces how Iptables limits the number of connections of the same IP address in linux to prevent CC/DDOS attacks. This is only the most basic method. If the attack is real, we still need hardware compaction to prevent it.
1. Set the maximum number of connections to port 80 to 10, which can be customized
source of the visitorUse the unicast Reverse Path forwarding to check if the IP address of the visitor is true and, if it is false, it will be masked by a reverse router query method. Many hacking attacks often confuse users with fake IP addresses, and it's hard to find out where it comes from. Therefore, the use of unicast Reverse Path forwarding can reduce the
DDoS attacks are essentially time-series data, and the data characteristics of t+1 moments are strongly correlated with T-moments, so it is necessary to use HMM or CRF for detection! --and a sentence of the word segmentation algorithm CRF no difference!Note: Traditional DDoS detection is directly based on the IP data sent traffic to identify, through the hardware
/wKiom1Y20MOCeQ4aAAEUlH5o8Po851.jpg "title=" 14slowattack.png "alt=" Wkiom1y20moceq4aaaeulh5o8po851.jpg "/>6.3 We will remember that we set the attack detection time is 1 minutes, after an attack for a period of time, we monitor the status of Iptables, we can see that the IP address of the
address should be attacked? 66.218.71.87 this machine paralyzed, but other hosts can also provide the WWW service, so want to let others access to http://www.yahoo.com words, all these IP address of the machine is paralyzed. In real-world applications, an IP address often r
I think now everyone contact with the VPS for a long time, also know that the Internet is ddos,cc is the norm, in the absence of hard defense, looking for software replacement is the most direct method, such as with iptables, but iptables can not be automatically shielded, can only be manually shielded, Today, I would like to introduce you to a software that can automatically block Ddos,cc,syn attacks:
DDoS deflate is actually a shell script that uses Netstat and iptables tools to block IP that has too many links, effectively preventing common malicious scanners, but it is not really an effective DDoS defense tool.
Work Process Description:
The same IP link to the number of connections to the server after the setti
the other head field, that is, do not send "\r\n\r\n" flag, will cause the server to run out of connection, IIS, nginx to modify, However, Apache does not seem to have modified it; As with the slow post attack, the content-length specifies the transmission length of the body, specifying a large content-length value, and then slowly sending the body information, thus occupying an HTTP connection, The server resources are then exhausted. Others are dat
Reason
PHP script part of the source code:
Copy the Code code as follows:
$fp = Fsockopen ("udp://$ip", $rand, $errno, $ERRSTR, 5);if ($fp) {Fwrite ($fp, $out);Fclose ($FP);
PHP script in the Fsockopen function, to the external address, through the UDP send a large number of packets, attack each other.
Response
You can disable the Fsockopen function through php.
request is issued repeatedly and at high speed, so that the injured host cannot handle all the normal requests in time.Severe, it can cause system panic.Because the network layer of denial of service attacks have exploited the network protocol, some of the network or equipment to seize the limited processing capacity, so that the prevention of denial of service attacks has become a very headache for administrators. Especially in most of the network environment backbone of the common use of fire
and cause a denial of service. A common phenomenon is that the website is slow, such as snail ing, ASP program failure, PHP database connection failure, and the CPU usage of the database master program is high. This attack is characterized by completely bypassing common firewall protection and easily finding some proxy agents to launch attacks. The disadvantage is that the effect of websites with only static pages is compromised, in addition, some pr
In the Aliyun background of cloud shield monitoring---"threat---" attack, will find a large number of malicious attacks every day, there are a large number of GET requests, resulting in server resources waste useless consumption.
Type of attack in the last 7 days
Carefully look at the source of the attack information, found that more than 99% of th
DDoS (Distributed denial of service) attack is a simple and fatal network attack using TCP/IP protocol vulnerability, because the TCP/IP protocol is unable to modify the session mechanism, so it lacks a direct and effective defense method. A large number of examples prove th
DDoS (Distributed denial of service) attack is a simple and fatal network attack using TCP/IP protocol vulnerability, because the TCP/IP protocol is unable to modify the session mechanism, so it lacks a direct and effective defense method. A large number of examples prove th
attacks, or how otherwise called distributed. Or just that example, your machine can send 10 attack packets per second, and the attacked machine can accept 100 packets per second, so your attack will not work, and you can use 10 or more machines to attack the target machine, hey! I will not tell you the result.
DrDoS distributed reflective denial of service
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.