HOW TO STOP DDOS ATTACKS: 6 TIPS TO COMBAT DDOS ATTACKS?

Knowing how to stop DDoS attacks quickly can make the difference between an organization's prosperity and bankruptcy. This is because the impact of a successful DDoS attack will be catastrophic, leaving the organization offline and unable to interact with clients.

Knowing how to stop DDoS attacks quickly can make the difference between an organization's prosperity and bankruptcy. This is because the impact of a successful DDoS attack will be catastrophic, leaving the organization offline and unable to interact with clients.

If you are the victim of a DDoS attack, you are not alone. The victims of the DDoS 2018 attack have drawn the attention of various organizations such as Google, Amazon, PlayStation, Pinterest, GitHub, and others.

A basic denial of service (DoS) attack attacks a large amount of traffic on an IP address. If the IP address points to a web server, then that IP address (or its upstream router) may be overloaded. Legitimate traffic destined for your web server will be inaccessible and your site will be unavailable. Denied service.

Distributed denial of service (DDoS) is a special type of denial of service attack. The principle is the same, but malicious traffic is generated from multiple sources, coordinated from one central point. The fact that traffic sources are distributed, often worldwide, makes it much more difficult to block DDoS attacks than those that originate from a single IP address.

DDoS attacks are more frequent

DDoS attacks are becoming more common, according to a study published by Corero Network Security in late 2017. DDoS analysis and trend reports found a 35% increase in the number of attacks between the second quarter of 2017 and the third quarter. from 2017.

One of the reasons for its popularity is the increasing number of insecure Internet of Things (IoT) devices that have been infected and are being recruited by botnets like Reaper.

Additionally, the amount of data released by victims of DDoS attacks has increased significantly, mainly due to amplification attacks, such as the memcached amplification attack method. Earlier this year, cybercriminals launched around 15,000 memcached attacks. This included an attack on GitHub at a staggering 1.35 Tbps.

Preventing DDoS attacks is almost impossible if a malicious attacker can launch more than 1 Tbps on the server. Therefore, it is more important than ever to understand how DDoS attacks stop after they begin to affect operations. Here are six tips to stop managed ddos services.

How to stop DDoS attacks

  1. Identify DDoS attacks early

If you are running your own server, you should be able to determine when it is under attack. This is because the sooner you can confirm that the website problem is due to a DDoS attack, the more you can stop the DDoS attack.

 To do this, we recommend that you have a good understanding of common inbound traffic profiles. The better you understand what your normal traffic looks like, the easier it will be to identify when your profile changes. Most DDoS attacks start as a sharp spike in traffic. It will be helpful to know the difference between a surge in legitimate visitors and the appearance of DDoS attacks.

It is also recommended to designate an internal DDoS leader to take action in the event of an attack.

  1. Over-provisioning of bandwidth

In general, it makes sense to have more bandwidth available to your web server than you think you will need. By doing so, you can respond to sudden and unexpected spikes in traffic that may result from advertising campaigns, special offers, or the mention of your company in the media.

Overprovisioning of 100% or 500% will not stop DDoS attacks. However, it may take a few additional minutes before the resources are completely overflowed.

  1. Protect at the network perimeter (if you are running your own web server)

Especially during the first few minutes, there are some technical steps you can take to partially mitigate the effects of the attack, some of which are fairly simple. 

For example, you can:

  • Limit your router speed to Avoid overloading your server of web
  • The Add a filter to INSTRUCT the router to drop packets The Apparent of Attackers
  • For Waiting for the half-time the open connections more aggressively
  • Drop forged or a malformed-packages
  • The Set lower the SYN, the ICMP, and the UDP flood drop Thresholds

But the truth is, while these procedures were previously effective, DDoS attacks are generally too large for these measures to completely block. Again, with the increase in DDoS attacks, you can expect to gain some time.

  1. Contact your ISP or hosting provider

The next step is to call your ISP (or hosting provider if you don't host your own web server) to tell them you're under attack and ask for help. Keeping emergency contacts from your ISP or hosting provider available will help you get in touch quickly. Depending on the strength of the attack, your ISP or hosting company may have already detected it, or the attack itself can be overwhelming.

If your web server is in a hosting hub, you are more likely to have a DDoS attack that you run yourself. This is because the data center is likely to have much higher bandwidth links and larger routers than its own data center, and its staff will have more experience in responding to attacks. Placing the web server in conjunction with the hosting service routes DDoS traffic to the web server and disconnects it from the corporate LAN. Therefore, at least that part of the business, including email and voice over IP (VoIP) services, will work well during an attack.

 If the DDoS attack is large enough, the first thing that a hosting company or ISP would do is "nullify" the traffic. This causes packets destined for the web server to be discarded before they arrive.

“If a hosting company allows DDoS on its network, it can be very expensive since it consumes a lot of bandwidth and can affect other clients.

  1. Contact DDoS Mitigation Experts

For very large attacks, you are more likely to stay in line with a professional DDoS mitigation company. These organizations have a large infrastructure and use a variety of technologies, such as data cleansing to help keep their websites online. You may need to contact a DDoS mitigation company directly, or your hosting company or service provider may have a partnership to tackle a full-scale attack.

"When a customer needs DDoS mitigation, we forward that traffic to (DDoS mitigation company) Black Lotus," said Dufficy. "This is done with BGP, so it only takes a few minutes."

Black Lotus debugging centers can handle very high levels of traffic and send clean traffic to the desired destination. This increases latency for website users, but at the cost of preventing users from accessing the site.

DDoS mitigation services are not free, so it's up to you to pay to stay online or wait for the DDoS attack and attack to subside before continuing your business. If you continue to subscribe to DDoS mitigation services, it can cost hundreds of dollars a month. However, if you wait until you need the service, pay more and hope it takes longer to start.

  1. Create a DDoS playbook

The best way to ensure that your organization reacts as quickly and effectively as possible to thwart DDoS attacks is to document every step of a pre-planned response when an attack is detected in detail. It is creating a playbook.

This should include the actions detailed above, including the contact names and phone numbers of anyone to be implemented as part of the playbook plan. DDoS Mitigation Enterprises can help with this by running simulated DDoS attacks to develop and improve rapid business procedures to respond to real attacks.

An important part of the planned response to DDoS attacks that should not be overlooked is how to communicate the problem to the customer. DDoS attacks can last 24 hours a day, and proper communication can minimize the cost to your business while under attack.

136 Просмотры