Answer the question
In order to leave comments, you need to log in
Protection against DDOS attacks?
The question came after reading the topic: 100+ Gb / s DDoS .
At the moment, this question is relevant in view of the rather simple creation of a network of DDoS bots, but let's leave this point, it is the question of protection against these types of attacks, both in software and hardware implementation, the classification of ddos attacks and I will repeat the methods of protecting / repelling attacks that are of interest.
And one of the questions of interest: ways to find a bot breeder to reach the customer * we do not take into account the hijacking of bots * and what kind of responsibility he can face under the legislation of the Russian Federation.
Answer the question
In order to leave comments, you need to log in
The answer to your question only on the practical part of protection against DDoS pulls on a small book, well, or an hour report on the highload =))
Thanks to everyone for the answers, and so let's summarize temporarily:
We have several types of attacks, one of which is dosing the web applications and services themselves, *as for example, let it be old, but still (I need a fresh example, I will give it) www.securitylab.ru /vulnerability/203865.php * software update, scripts.
Further, with a small attack, we can use some kind of software, web services to compile and generate firewall rules and .htaccess, for example: ipinfodb.com/
IPinfoDB is a monthly updated database of IP address ranges tied to different countries, here you can quickly see which country a particular IP belongs to, inside the service there are several built-in tools for generating firewall rules and .htaccess, with which you can block access to server by geography. If you need to quickly repel the influx of bots from China or from somewhere else, this is a very good helper.
It is almost impossible to trace the customer - this is the relative ease of use of this type of attack and explains their popularity ... Unless the customer "burns out" himself, which is unlikely.
And so article 273 of the Criminal Code of the Russian Federation threatens them at least.
On the topic of the law - the main 3 articles about access to computers ... and for severity they
solder
extortion /
fraud
bot management (if it is calculated and taken under control)
3) leave contacts that can be associated with a living person (mail, icq, jabber), or which can be viewed by third parties
4) wag a lot of language
To begin with, it seems to me, we need to figure out what is required as a “protection against attack”?
It seems that everyone has their own vision of this issue ...
Based on our many years of DDoS protection practice,
we ( ddos-guard.net ) can give several relevant recommendations.
1) The reality is that protection at one point of presence (POP) is meaningless. Bots are practically not attacked now, the most popular technology is DNS amplification, attacks in which reach 130-150Gbps, but the average value of a spherical attack in a vacuum for this type of attack is about 30Gbps, which is much more than an ordinary webmaster / hoster can filter on their own.
2) But even if a webmaster/hoster wants to spend a dozen or two thousand dollars on a 30Gbps infrastructure, because 50Gbps may well arrive and this will nullify all efforts. The conclusion is to use specialized services that spend a lot of money on maintaining and developing their geo-distributed infrastructure.
3) For a hoster, the best solution is a secure IP transit, when its networks are advertised with a DDoS defender and already cleared traffic comes to it.
4) You never need to pay blackmailers who attack you - it's like bargaining with terrorists, giving them money you will pay more than once.
If you need advice on a specific case - please ask a question here or at [email protected], we will help.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question