OP 08 February, 2020 - 11:37 AM
[align=start] computers in botnet are quite a standard request for the site. For example, all zombies are prompted to view pages of the site at once, while other users do the same. In this article we will discuss how to "prevent and combat DOS and DDOS attacks" .[/align]
[align=start]Websites For Any Reason Being DDOS Attack In the first step, what layer of the OSI model should be identified? Attacks are usually in layer 7 (software) or in layers 3 and 4 of the network, the extent of an attack depends on features such as the volume and number of packets sent per second.[/align]
[align=start]Layer 3 and 4 attacks are extremely difficult to contain, and if they are high in volume, they must be managed and restrained before they reach the server, and the server administrator itself cannot find a solution to the problem. Therefore, it requires hardware firewalls and a robust network to contain these attacks, which is not possible in most datacenters, and requires server hosted DDoS Protected datacenters.[/align]
[align=start]Layer 7 attacks may be somewhat resistant to software firewalls, but if the number of packets sent is high and the pattern is not high, it will also be difficult to control such attacks, most of which Sending GET or POST statements increases the amount of server resources consumed, such as RAM and CPU, which disrupts normal server performance.[/align]
[align=start]Defending against DOS attacks involves a combination of attack detection tools, response tools, and traffic categorization (to block illegal traffic and allow legitimate traffic).[/align]
[align=start]One way to prevent DDoS attacks is to use online firewalls, a new generation of online firewalls offered by Central Hosting is called Cloud Protect, this type of firewall is currently the only example of an Iranian firewall of its kind that users By changing the half-server they make their website resistant to DDoS attacks.[/align]
[align=start]In this way, the user uses central hosting servers to protect his website and server from attacks. The web host server is redirected, also the site's main ip is hiding to prevent visual attacks.[/align]
Countering DOS and DDOS attacks
[align=start]This firewall is suitable for people who are themselves hosting or servers (dedicated / virtual) and do not intend to move their website to another hosting or server.[/align]
Among the proper ways to prevent denial of service attacks
[align=start]To prevent an attack from happening on your site, configure the external router to block all outgoing packets that have a source address inconsistent with your subnet. If the forged package cannot be removed, it can do little damage.[/align]
Countering DOS and DDOS attacks
[align=start]To avoid being an intermediary and participating in another DOS attack, configure your router to block packets that target all of your network addresses. That is, do not allow the ICMP packets released to your network to pass through the router. This allows you to maintain the ability to ping all systems on your network, while allowing this to be done from an external system. If you're really worried, you can configure your host systems to completely prevent ICMP releases.[/align]
[align=start]Defense against SYN Outburst Attacks: Small blocks Allocate a small record instead of allocating a complete communication type object (which will take up a lot of space and eventually memory). Newer implementations for input SYNs only allocate 16 bytes.[/align]
[align=start]SYN cookies are a new defense against the SYN outbreak "SYN cookies". In SYN cookies, each side of the connection has its own Sequence Number. In response to a SYN, the system under attack generates a special sequence of communication that is a "cookie" and then forgets everything or removes some memory (the cookie as the unique identifier of an exchange). Or negotiation is used). The cookie contains the necessary information about the connection, so it can later recreate the information forgotten about the connection when packets come from a healthy connection.[/align]
[align=start]With the netstat -an | grep: 80 command you can see all the connections that are connected to port 80, then using the netstat -an | grep command SYN_RECV we can see where it started with SYN_RECV.[/align]
[align=start]Number of Apache connections and number of SYN_RECV connections:[/align]
[align=start]List of tools to prevent and combat DOS and DID attacks[/align]
[align=start]Firewalls: Firewalls are configured to accept or reject protocols according to simple rules. For example, if attacks occur from multiple unusual IPs, a simple rule can be set to ignore forwarding packets.[/align]
[align=start]Switches: Most switches have Rate-Limiting and ACL capabilities. Some switches offer automatic or system-wide rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering capabilities to detect and modify DOS attacks through automatic rate filtering and WAN Link Failure. And Balancing.[/align]
[align=start]Routers: Like switches, routers also have Rate-Limiting and ACL capabilities. They are also adjusted manually. Most routers break easily against DOS attacks. If you set the rules in the router to provide statistics during the attacks, the router will become slower and more complex. Cisco IOS has features that prevent Flooding.[/align]
[align=start]Routers can be configured to prevent simple ping attacks by filtering unnecessary protocols and can also stop invalid IP addresses. However, routers are usually less susceptible to more complex spoofing attacks and application-level attacks using valid IP addresses.[/align]
[align=start]Application Front End Hardware: Intelligent hardware that sits on a network path before traffic arrives at the server. It can be used in the connection between routers and switches. This hardware analyzes packets as soon as they are logged in and identifies them by priority, commonality, or risk.[/align]
[align=start]IPS-based Prevention: Intrusion-prevention systems (IPS) are effective in attacks that are Signature Associated. Although the attacks tend to be legitimate content, they pursue the wrong intent. They cannot block Behavior-Based DOS attacks.[/align]
[align=start]DDS Defense: Unlike IPS problems, the DOS Defense System or DDS is able to block DOS connection-based attacks and attacks that have legitimate but malicious content. A DDS will handle both protocol base attacks (such as Treadrop and Ping of death) and rate-based attacks (such as ICMP Floods and SYN Floods).[/align]
[align=start]Blackholing and Sinkholing: Using blackholding, all DNS traffic is attacked or the IP address is sent to the black hole (non-existent server). Used.[/align]
[align=start]Clean pipes: All traffic from a "cleaning center" or a "scrubbing center" through methods such as proxies, tunnels or even direct circuits that separate "bad" traffic (DDOS as well as other Internet attacks) and only traffic. Transfer the good to the server, pass it. The performer must have central internet connection to manage this type of service unless they can be easily implemented using a "cleaning center" or "scrubbing center".[/align]
[align=start]Black Hole: This method blocks all traffic to the Black Hole! That is, where the packets are discarded. The disadvantage is that all traffic - good or bad - is discarded and in fact the network will be used as an off-line system. Such methods do not even allow legitimate users access.[/align]
[align=start]Intrusion Detection Systems: Systems intrusion detection (intrusion detection systems) provides capabilities that can detect the use of protocols as a means of attack is valid. These systems can be used with firewalls to automatically block traffic when needed. At times, the intrusion detection system needs to be adjusted by security experts, and sometimes it can be mistaken for intrusion detection.[/align]
[align=start]Servers: Proper configuration of server applications has a major impact on minimizing the impact of a DDoS attack. A network administrator can clearly identify what resources an application can use and how to respond to client requests. Optimized servers, in combination with mitigation tools, may still have the chance to continue service when they are DDoS attacked.[/align]
[align=start]You can use Dos_Deflate software. With this software you can manage the number of connections each IP has made to your server. Some tips for editing the configuration file (nano /usr/local/ddos/ddos.conf) that you should be careful about, the EMAIL_TO values you specify the email you want to receive reports, FREQ to specify the connection number Each IP per minute we recommend not assigning more than 5, NO_OF_CONNECTIONS specifies the maximum number of connections each IP can have. (The best value is between 100 and 200.) And…[/align]
[align=start]In addition to installing the above software, installing CSF and BFD firewalls can increase web server security. Remember, the most important thing before installing any optimization software is your Apache web server.[/align]
[align=start]DDoS Discount Tool: Several companies make tools to disinfect! Traffic mitigation or DDoS attacks are often used to balance network load or firewall. These tools have different levels of impact. None are perfect. Some also block legitimate traffic and some illegal traffic allow access to the server. The server infrastructure still needs to be made more robust to do better than true in identifying traffic.[/align]
[align=start]High Bandwidth: Buying or providing high bandwidth or add-on networks to deal with times when traffic is high can be effective against DDoS.[/align]
[align=start]Generally, companies do not know in advance that a DDoS attack will occur. The nature of an attack sometimes changes between jobs and requires the company to respond quickly and consistently within hours or days. Since the primary impact of most attacks is consuming your network bandwidth, a well-managed and equipped Internet service provider has both the right bandwidth and the necessary tools to mitigate the impact of an attack[/align]
[align=start]Websites For Any Reason Being DDOS Attack In the first step, what layer of the OSI model should be identified? Attacks are usually in layer 7 (software) or in layers 3 and 4 of the network, the extent of an attack depends on features such as the volume and number of packets sent per second.[/align]
[align=start]Layer 3 and 4 attacks are extremely difficult to contain, and if they are high in volume, they must be managed and restrained before they reach the server, and the server administrator itself cannot find a solution to the problem. Therefore, it requires hardware firewalls and a robust network to contain these attacks, which is not possible in most datacenters, and requires server hosted DDoS Protected datacenters.[/align]
[align=start]Layer 7 attacks may be somewhat resistant to software firewalls, but if the number of packets sent is high and the pattern is not high, it will also be difficult to control such attacks, most of which Sending GET or POST statements increases the amount of server resources consumed, such as RAM and CPU, which disrupts normal server performance.[/align]
[align=start]Defending against DOS attacks involves a combination of attack detection tools, response tools, and traffic categorization (to block illegal traffic and allow legitimate traffic).[/align]
[align=start]One way to prevent DDoS attacks is to use online firewalls, a new generation of online firewalls offered by Central Hosting is called Cloud Protect, this type of firewall is currently the only example of an Iranian firewall of its kind that users By changing the half-server they make their website resistant to DDoS attacks.[/align]
[align=start]In this way, the user uses central hosting servers to protect his website and server from attacks. The web host server is redirected, also the site's main ip is hiding to prevent visual attacks.[/align]
Countering DOS and DDOS attacks
[align=start]This firewall is suitable for people who are themselves hosting or servers (dedicated / virtual) and do not intend to move their website to another hosting or server.[/align]
Among the proper ways to prevent denial of service attacks
- The most effective way to use the DDos Protection services of companies such as Cloudflare, blacklotus, etc.
- Purchase an IDS protection system like the Ax3soft Sax2
- Securing the server for common malicious shell failures
- Professional antivirus installation and configuration for automatic server scanning
- Professional anti-Shell installation and configuration to automatically scan the server to prevent malware and malicious activity on the server
- Secure symlink to prevent other hosts from accessing the server
- Close access to dangerous operating system files for greater security
- Close ports and remove unnecessary server services
- Kernel operating system security
- Secure php service
- Secure installed web server nginx, apache, litespeed and lighthttpd
- Secure server game ports
[align=start]To prevent an attack from happening on your site, configure the external router to block all outgoing packets that have a source address inconsistent with your subnet. If the forged package cannot be removed, it can do little damage.[/align]
Countering DOS and DDOS attacks
[align=start]To avoid being an intermediary and participating in another DOS attack, configure your router to block packets that target all of your network addresses. That is, do not allow the ICMP packets released to your network to pass through the router. This allows you to maintain the ability to ping all systems on your network, while allowing this to be done from an external system. If you're really worried, you can configure your host systems to completely prevent ICMP releases.[/align]
[align=start]Defense against SYN Outburst Attacks: Small blocks Allocate a small record instead of allocating a complete communication type object (which will take up a lot of space and eventually memory). Newer implementations for input SYNs only allocate 16 bytes.[/align]
[align=start]SYN cookies are a new defense against the SYN outbreak "SYN cookies". In SYN cookies, each side of the connection has its own Sequence Number. In response to a SYN, the system under attack generates a special sequence of communication that is a "cookie" and then forgets everything or removes some memory (the cookie as the unique identifier of an exchange). Or negotiation is used). The cookie contains the necessary information about the connection, so it can later recreate the information forgotten about the connection when packets come from a healthy connection.[/align]
[align=start]With the netstat -an | grep: 80 command you can see all the connections that are connected to port 80, then using the netstat -an | grep command SYN_RECV we can see where it started with SYN_RECV.[/align]
[align=start]Number of Apache connections and number of SYN_RECV connections:[/align]
Code:
netstat -an|grep :80|wc -l
netstat -an|grep SYN_RECV|wc -l
[align=start]Firewalls: Firewalls are configured to accept or reject protocols according to simple rules. For example, if attacks occur from multiple unusual IPs, a simple rule can be set to ignore forwarding packets.[/align]
[align=start]Switches: Most switches have Rate-Limiting and ACL capabilities. Some switches offer automatic or system-wide rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering capabilities to detect and modify DOS attacks through automatic rate filtering and WAN Link Failure. And Balancing.[/align]
[align=start]Routers: Like switches, routers also have Rate-Limiting and ACL capabilities. They are also adjusted manually. Most routers break easily against DOS attacks. If you set the rules in the router to provide statistics during the attacks, the router will become slower and more complex. Cisco IOS has features that prevent Flooding.[/align]
[align=start]Routers can be configured to prevent simple ping attacks by filtering unnecessary protocols and can also stop invalid IP addresses. However, routers are usually less susceptible to more complex spoofing attacks and application-level attacks using valid IP addresses.[/align]
[align=start]Application Front End Hardware: Intelligent hardware that sits on a network path before traffic arrives at the server. It can be used in the connection between routers and switches. This hardware analyzes packets as soon as they are logged in and identifies them by priority, commonality, or risk.[/align]
[align=start]IPS-based Prevention: Intrusion-prevention systems (IPS) are effective in attacks that are Signature Associated. Although the attacks tend to be legitimate content, they pursue the wrong intent. They cannot block Behavior-Based DOS attacks.[/align]
[align=start]DDS Defense: Unlike IPS problems, the DOS Defense System or DDS is able to block DOS connection-based attacks and attacks that have legitimate but malicious content. A DDS will handle both protocol base attacks (such as Treadrop and Ping of death) and rate-based attacks (such as ICMP Floods and SYN Floods).[/align]
[align=start]Blackholing and Sinkholing: Using blackholding, all DNS traffic is attacked or the IP address is sent to the black hole (non-existent server). Used.[/align]
[align=start]Clean pipes: All traffic from a "cleaning center" or a "scrubbing center" through methods such as proxies, tunnels or even direct circuits that separate "bad" traffic (DDOS as well as other Internet attacks) and only traffic. Transfer the good to the server, pass it. The performer must have central internet connection to manage this type of service unless they can be easily implemented using a "cleaning center" or "scrubbing center".[/align]
[align=start]Black Hole: This method blocks all traffic to the Black Hole! That is, where the packets are discarded. The disadvantage is that all traffic - good or bad - is discarded and in fact the network will be used as an off-line system. Such methods do not even allow legitimate users access.[/align]
[align=start]Intrusion Detection Systems: Systems intrusion detection (intrusion detection systems) provides capabilities that can detect the use of protocols as a means of attack is valid. These systems can be used with firewalls to automatically block traffic when needed. At times, the intrusion detection system needs to be adjusted by security experts, and sometimes it can be mistaken for intrusion detection.[/align]
[align=start]Servers: Proper configuration of server applications has a major impact on minimizing the impact of a DDoS attack. A network administrator can clearly identify what resources an application can use and how to respond to client requests. Optimized servers, in combination with mitigation tools, may still have the chance to continue service when they are DDoS attacked.[/align]
[align=start]You can use Dos_Deflate software. With this software you can manage the number of connections each IP has made to your server. Some tips for editing the configuration file (nano /usr/local/ddos/ddos.conf) that you should be careful about, the EMAIL_TO values you specify the email you want to receive reports, FREQ to specify the connection number Each IP per minute we recommend not assigning more than 5, NO_OF_CONNECTIONS specifies the maximum number of connections each IP can have. (The best value is between 100 and 200.) And…[/align]
[align=start]In addition to installing the above software, installing CSF and BFD firewalls can increase web server security. Remember, the most important thing before installing any optimization software is your Apache web server.[/align]
[align=start]DDoS Discount Tool: Several companies make tools to disinfect! Traffic mitigation or DDoS attacks are often used to balance network load or firewall. These tools have different levels of impact. None are perfect. Some also block legitimate traffic and some illegal traffic allow access to the server. The server infrastructure still needs to be made more robust to do better than true in identifying traffic.[/align]
[align=start]High Bandwidth: Buying or providing high bandwidth or add-on networks to deal with times when traffic is high can be effective against DDoS.[/align]
[align=start]Generally, companies do not know in advance that a DDoS attack will occur. The nature of an attack sometimes changes between jobs and requires the company to respond quickly and consistently within hours or days. Since the primary impact of most attacks is consuming your network bandwidth, a well-managed and equipped Internet service provider has both the right bandwidth and the necessary tools to mitigate the impact of an attack[/align]