当前位置:网站首页>What if the website is attacked by DDoS?
What if the website is attacked by DDoS?
2022-04-23 00:05:00 【Sir (cookieboy)】
DDOS Attacks generally refer to distributed denial of service attacks , Because it's very hidden , So it's very difficult to trace the source , It has always been one of the most troublesome traffic attacks in the network . If the website is DDOS attacked , We can solve the problem in the following ways :
First of all 、 Hardware firewall
Many people will think of installing a hardware firewall on the server hardware , So as to achieve the purpose of filtering and cleaning flow , But if the maximum capacity of the firewall is 300G, But the attack has 400G, Then the server will also be down , There are also cases where , The firewall filters out attacks , But the server is still dead , This may be because the broadband of the server itself is too small , Then the attack is big , There is also a lot of return to the source , The bandwidth resources of the source station are crowded at once , The website can't be opened , Of course, most hardware firewalls can only detect packets at the network layer , But when it comes to the application layer , There's nothing we can do .
second 、 Increase the server bandwidth and hard resistance
The bandwidth of the server first determines the ability of the server to withstand attacks , The server bandwidth of most domestic websites will not exceed 100M, Because in order to obtain high-quality and huge bandwidth , In terms of cost, it is not a small number ,DDOS The attack is by controlling the broiler , Personal computer , Server to contract , If hackers control enough , The amount is big enough , When hackers attack a website , The bandwidth of the server will be full at once . Increasing bandwidth is the most direct way in theory , But it's also the most expensive way , Therefore, most people will not choose to increase bandwidth at an expensive cost .
Third 、 Shut down unnecessary ports and services
For servers exposed to the public network , The fewer open ports the better , Because the more you open up , The more opportunities for hackers , Of course, if the customer has special needs, it will be counted separately , It's just from a security point of view , Some unnecessary services can also be shut down , Some services on the server that are not authorized by professional institutions , It is also recommended to close , Very vulnerable to vulnerabilities , Give hackers a chance .
Fourth 、 Access CDN service
For most CDN For service providers , There are many more advanced anti DDoS servers with the number of nodes , Content caching can be achieved on the data , Access can be accelerated in bandwidth , If there are many domestic users , It is possible to use the domestic high-level defense , Fast enough , Defense is good , But if the target users are more than domestic , Then it is suggested to connect to CDN service , Because many attack agents come from abroad , Of course, it does not rule out that there are also domestic quantities .
The fifth 、 Improve system throughput
If the attacker carries millions of requests , Our service can provide tens of millions of request processing capacity through load balancing strategy , Then it can be solved perfectly DDOS The problem of , After obtaining the flow, proceed to IP Prohibition . Similarly, attackers can send more requests to crush our services , Of course, this requires a higher cost , Because we believe that protecting system data security and improving system performance are the response to DDOS The right solution .
If you reprint , Please indicate the source : Open source byte https://sourcebyte.cn/article/70.html
版权声明
本文为[Sir (cookieboy)]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/04/202204230002019416.html
边栏推荐
- Thought of reducing Governance -- detailed summary of binary search
- Failed to execute goal on project xxxxx
- [VMware] VMware esxi 6.7 installation
- 彻底解决Failed to execute goal on project xxxxx
- PIL库在深度学习中的常见操作
- YASKAWA motor servo software sigmawin + cannot be connected to the servo driver
- 对指定目录下的图片,取图片名(不包含图片的扩展名)、将文件路径和图片名分开、将文件名和图片扩展名分开
- Calculate text size based on height
- Mysql中的七种常用查询连接详解
- L1-078 吉老师的回归 (15 分)
猜你喜欢

庞加莱球模型

Ignition Modbus

Thought of reducing Governance -- detailed summary of binary search
![[Objective-C advanced programming] - GCD](/img/54/62e8060421f8d3d05d13f02f4f4efd.png)
[Objective-C advanced programming] - GCD

常见的社群玩法盘点,你做的是哪一种?

STM32F103 independent watchdog

图像感受野的一些理解

A convnet for the 2020s summary

Vscode uses emmylua plug-in to debug unity project tolua code

Solve the error reporting problem of require is not defined
随机推荐
Introduction to cloud computing simulation framework cloudsim (screenshot version)
HyperMesh laminate composite case study notes
Detailed explanation of MySQL field types
力扣习题集3--无重复字符的最长子串
L1-075 obsessive compulsive disorder (10 points)
SystemVerilog verification - Test Platform writing guide learning notes (3): connecting design and test platform
Character set (de duplication)
SystemVerilog verification - Test Platform preparation guide learning notes (0): introduction to verification
2022-4-22 job MySQL single table query
PHP one-dimensional array de duplication
80386 compilation_ Introduction to global description table GDT
Conditional judgment (while loop & for & switch loop & if else judgment)
be based on. NETCORE development blog project starblog - (3) model design
SystemVerilog verification - Test Platform preparation guide learning notes (5): function coverage
Change the pycharm interface to Chinese and switch between Chinese and English
【事务管理】
Detailed explanation of seven common query connections in MySQL
Automatic watering system based on 51 single chip microcomputer
Daily CISSP certification common mistakes (April 22, 2022)
Ansible Yum warehouse