Web Design
Mobile Internet
Brand Design
Innovative
News
Encyclopedias

DDoS attacks on websites do great harm - how should servers be protected?

Date:2019-09-13 Source: Shangpin China Type: website encyclopedia
Word Size: small   medium   big

We mentioned the DDoS function before. Now we will introduce how to protect the DDoS function in detail.
The number of DDoS attacks grows exponentially
On August 25, the hammer "nut mobile phone" came out after a thousand calls, but it encountered a new product conference in a mess, which was unexpected by Luo Yonghao, and even more shocked many hammer fans. The main culprit of all this is that the official website server of Hammer suffered from dozens of gigabytes of DDoS malicious attacks, which led to the repeated postponement of the press conference on the same day. The on-site PPT was also made temporarily, with a lot of errors and omissions. The process of robbing red packets during this period also failed and ended in a hurry.
At the end of March, GitHub, a code hosting website, encountered a massive DDoS attack. The attacker hijacked the JS script of Baidu Advertising Alliance and replaced it with malicious code, and finally launched a large-scale distributed denial of service attack on GitHub by using overseas users visiting Chinese websites.
On May 11, NetEase suffered a DDoS attack. A large number of users found problems accessing NetEase News. Many game users reported that the game was severely disconnected. The NetEase News client Sina Weibo tweeted: Compared with previous DDoS attacks, this attack attacked the backbone network.
On May 28, eLong suffered a massive DDoS attack after Ctrip's failure, and its website service was once affected.
Recently, the number of DDoS attacks is growing exponentially. A security expert once said that "DDoS is the nuclear weapon in the attack." The large-scale network paralysis is the effect of DDoS attacks. People's deep fear of such nuclear weapons can be described as lingering.
DDoS attacks are harmful and difficult to prevent.
What is a DDoS attack? In a nutshell, attackers unite multiple computers to flood the target server. DDoS malicious attack (distributed denial of service attack) is a common network attack method at present. Its full English name is Distributed Denial of Service. In simple terms, many DoS attack sources attack a server together to form a DDOS attack, thus doubling the power of denial of service attacks. Usually, the attacker installs the attacker on each "chicken" on the network through the agent, and the agent will launch the attack when it receives the command.
With regard to DDoS attacks (distributed denial of service), Akamai Technology Company also released a security report on Internet development in the second quarter and made statistics. Data shows that this year's Q2, DDoS attacks set a new record, with a year-on-year growth of 132%. Among them, the peak traffic of the largest DDoS attack exceeded 240Gbps, lasting more than 13 hours. So far, the largest DDoS attack in the global Internet history was a game company deployed in Alibaba Cloud at the end of last year, with a peak attack traffic of 453.8Gbps.
DDoS attacks are very harmful and difficult to prevent, which can directly lead to website downtime, server paralysis, authority damage, brand shame, property loss and other huge losses, and seriously threaten the development of Internet information security in China.
Methods for servers to effectively defend against DDOS attacks
At present, hackers even put a price tag on the attack. It only costs 50 yuan to send 1G traffic to a website for an hour. The cost of DDoS is so low, and there is no supervision, which makes the prevention of DDoS more difficult.
With the rampant DDOS attacks on the Internet, what measures should the majority of website users take to effectively defend themselves? Next, we will introduce the basic methods for servers to effectively defend against DDOS attacks.
Hide the real IP address of the server
CDN is added to the front end of the server for transfer. If the funds are sufficient, you can purchase advanced anti DDoS shield machine to hide the real IP address of the server. The domain name resolution uses the CDN IP address, and all the resolved sub domain names use the CDN IP address. In addition, other domain names deployed on the server cannot be resolved using the real IP, and all are resolved using the CDN.
In addition, prevent the server from disclosing the IP address when transmitting information. The most common situation is that the server should not use the send mail function, because the header will disclose the server's IP address. If you have to send mail, you can send it through a third-party agent, so that the IP address displayed externally is the agent's IP address.
Ensure the security of the server system
First, ensure that the server software is free of any vulnerabilities to prevent attackers from intruding. Ensure that the server uses the latest system and applies security patches. Delete unused services on the server and close unused ports. For the website running on the server, ensure that it has applied the latest patch and has no security vulnerabilities.
This article comes from Shangpin China: Security website construction


Please contact our consultant

+86 10-60259772

Please provide your contact number. The project manager of shangpin China will contact you as soon as possible.