Wednesday, March 4, 2020

Protection Mitigate DDoS Attacks Your Server?

Generally, a DDoS is perpetrated by something known as a botnet – a collection of devices infected with some form of malware that allow them to be controlled via a central platform. Traditionally, such botnets primarily consisted of ‘zombie’ computers, and the odd printer or router. Unfortunately, this has changed.

Generally speaking, organizations should start planning for DDoS attacks in advance. It is much harder to respond after an attack is already under way. While DDoS attacks can't be prevented, steps can be taken to make it harder for an attacker to render a network unresponsive.

As the old saying goes, an ounce of prevention is worth a pound of cure. While it is relatively little you can do against a complex DDoS attack without some sort of mitigation appliance, there are a few measures you can take to defeat bog-standard attempts. In addition to over-provisioning bandwidth (or choosing a host that can dynamically provision bandwidth to your site), you should take the following precautions:
Use an IDS/IPS or WAF to detect attacks early.
Add filters that block packets from obvious sources of attacks (bogus/blacklisted IPs, infected devices, etc.).
Drop all malformed and spoofed packets.
Lower your thresholds for SYN, ICMP, and UDP Flood drops.
Architecture. To fortify resources against a DDoS attack, it is important to make the architecture as resilient as possible. Fortifying network architecture is an important step not just in DDoS network defense, but in ensuring business continuity and protection from any kind of outage or disaster situation.

Thanks to the Internet of Things, we are now seeing botnets comprised of a staggering variety of devices. Fridges, coffee machines, webcams, televisions…if it connects to the web, it can be hacked. And if it can be hacked, it can be forcibly inducted into a botnet.


More Info: ddos attack

No comments:

Post a Comment