14/10/2014

DDoS Attack and It's Preventions


What is DDoS Attack?
In computing, adenial-of-service (DoS) or distributed denial-of-service (DDoS) attackis an attempt to make a machine or network resource unavailable to its intended users. Although the means to carry out, the motives for, and targets of a DoS attack vary, it generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet.
As clarification distributed denial-of-service attacks are sent by two or more persons, or bots, and denial-of-service attacks are sent by one person or system. As of 2014, the frequency of recognized DDoS attacks had reached an average rate of 28 per hour.

How to protect yourself during DDoS attack?
Step 1. Obtain a clean IP from your Network provider/ISP preferably one on different network segment. This new IP Address will be known as your origin server IP Configure the fresh/new IP onto your server.
Step 2. Let us know via email what your new origin IP is so we can setup the configuration on our side.
Step 3. If you require SSL on this server, email us the cert and private key in .PEM format. This should be in plain text and may be copied and pasted and included in the "step-2" email.
Step 4. If you have a firewall or other ACL's in your network please ensure that you allow those IP blocks access to your servers and I will need to forward you our IP Blocks so they will have access.
Step 5. We will send you IP Address. Make a DNS change to point your domain(s) to the IP Address we sent you. Ensure your TTL is set to 5 minutes or less.
Step 6. Remove the old IP Address from the server.
At this stage your traffic will start finding it's way to us where we will apply the required filters and send your server the legitimate traffic and will be in communication with you throughtout this process, to ensure everything is functioning as expected.
That's it. All things considered, the whole process should take about an hour.
Share on Facebook