8 Methods to combat DDOS attacks

7:01 PM
8 Methods to combat DDOS attacks -

Distributed Denial of Service (DDoS) create a huge burden on businesses. They are costly for companies, both in terms of lost revenue and additional costs. DDoS attack protection plays a vital role in keeping online activities. Here are some of the strategies that are used to ensure the provision of services for the consumer is uninterrupted.

1. In the firewall

Network administrators can use simple rules to prevent or bring IPs, protocols or ports. Depending on where the firewall is in the hierarchy of networks, firewalls are suitable to stop the internal flooding attacks even though they may not have the intelligence to determine good traffic.

more complex attacks but are usually difficult to solve because it is not possible to drop all traffic to a port as this may prevent legitimate traffic to get to the server.

The firewalls that are too deep within the network can not help much because the router can get clogged before traffic reaches the firewall. However, they form a large simple defense against DDOS attacks.

2. The switch as mitigating DDOS tool

Switches are usually built with a capacity 'of automatic control. As a result, they may limit the level of data flooding at the system level or traffic shaping, late binding or TCP splicing, deep packet inspection and filtering bogon. Traffic or packet shaping delay some or all of the data that lead them to a desired traffic profile. It is a form of limiting traffic rate. It can be used to increase the usable bandwidth of specific traffic sacrificing speed access for others. Late binding allows a router for further routing information for specific traffic postponing connection between a client and a server.

Network administrators can set these parameters manually or use the default settings of the manufacturer.

3. When the router level

network engineers can manually set the limiting capacity rate of their routers and configure a checklist. As a result of these changes, the router can prevent flooding of requests by a DDOS attack, keeping a network accessible to its main users.

4. Intrusion Prevention Systems or IPS-based systems

prevention systems can be intrusive statistical anomaly-based, stateful or signature based protocol analysis. For the signature based detection, attack patterns that are known are used to identify patterns in similar arrival. Statistical anomaly-based IPS to create a baseline and respond when the baseline characteristic is flaunted as stateful detection analysis protocol uses deviations from the states of predefined protocol to detect activity.

for the attacks that have a signature, it is easy to use IPS systems to prevent DDoS attacks. For such attacks, harmful content received active quickly the system to prevent the passage of suspicious items. Some attacks that are hidden under legitimate content can be difficult to detect until the attack proceeded to cripple the network. DDoS attacks can be content or behavior based. intrusion prevention systems based content can not block the behavior-based DDOS attack, and vice versa.

application specific integrated circuit ASIC or Intrusion Prevention Systems can block and detect DDOS attacks on the grounds that they have the processing power and the ability to break down the traffic in its simplest level.

On the other hand, an IPS based on frequency or RBIPS usually system analyzes incoming traffic on a network to identify any anomalies but let the legitimate traffic through.

5. Black Holing Holing and Sink

Sink drilling means sending traffic to an IP that works so that it receives the incoming traffic and filters for remove the bad traffic. Black hole on the other hand refers to sending the incoming traffic is affecting a non-existent IP address server. To make more efficient black hole, an Internet service provider is used.

6. Prevention Using proactive testing

A test platform can be used to identify areas weaknesses in a network. The information received by this system can be used to direct the creation of automated and manual systems that can be used for the backup line in case the activation of the network under a DDoS attack.

7. Using Clean Pipes

Type of this DDOS protection technique routes all inbound traffic through a cleansing or a washing center separating the DDoS traffic or any traffic as suspect: more thru allowing ordinary traffic. To manage this structure, the network must be connected to the Internet. To clean the incoming traffic, they are used various methods. These include direct circuits, tunnels and proxy.

8. front-end hardware Application

hardware can be used as part of a defense against attacks staggered, and stands as the first line of defense against DDoS attacks. front-end software application is placed in front of the server to block traffic flooding attacks on a network. Using algorithms that scan and classify incoming packets, the application hardware front-end label incoming traffic based on various criteria including the highest priority, adjust or dangerous.

0 Komentar