What is a DDos attack? Solutions for how to prevent Ddos attacks

DDoS攻击是最常见的网络威胁,而且可能危及你的业务、网站安全性、销售和商誉,因为DDoS攻击可以造成网络的严重堵塞和服务器的瘫痪,本文狂人SEO分享下什么是DDos攻击?怎样预防及抗ddos攻击解决方案。

怎样预防ddos攻击


一、什么是DDos攻击

DDos向特定的目标发动“阻断服务”式攻击,也称为分散式阻断服务攻击(distributed denial-of-service attack),简称 DDoS 攻击。DDoS 攻击是利用分散多处的众多电脑或设备发送大量数据包,借此消耗网站带宽与系统资源,导致网络瘫痪,无法提供正常服务。此类攻击的逻辑可以用一个比喻来解释,如果有1000位不付钱的客户进入你的商店并堵住入口,不让正常客户入内消费,这会导致商店无法正常做生意,所以怎样预防DDoS攻击很重要。

二、DDoS攻击的表现形式

DDoS的表现形式主要有两种,一种为流量攻击,主要是针对网络带宽的攻击,即发送大量数据包导致网络带宽被阻塞,合法网络包被虚假的攻击包淹没而无法到达主机;另一种为资源耗尽攻击,主要是针对服务器主机的攻击,即通过大流量访问导致主机的内存被耗尽或CPU被占用100%而无法提供网络服务。

当被DDoS攻击时,主要表现为:

1、网络和设备正常的情况下,服务器突然出现连接断开、访问卡顿、用户掉线等情况。
2、被攻击主机上有大量等待的TCP连接。
3、服务器CPU或内存占用率出现明显增长。
4、网络中充斥着大量的无用的数据包,源地址为假。
5、制造高流量无用数据,造成网络拥塞,使受害主机无法正常和外界通讯。
6、利用受害主机提供的服务或传输协议上的缺陷,反复高速地发出特定的服务请求,使受害主机无法及时处理所有正常请求。
7、网络出站或入站流量出现明显增长。
8、登录服务器失败或者登录过慢。
9、严重时会造成系统死机。

三、DDoS攻击的类型

DDoS攻击有数种类型。一般来说,DDoS攻击主要可分成三种类别:巨流量攻击、通讯协定攻击,以及资源层攻击。

1、巨流量攻击会以感觉像真实的流量来瘫痪网络层。这类型的攻击是最常见的DDoS攻击形式。

2、通讯协定攻击会利用层级3和层级4通讯协定堆叠的弱点,造成服务中断。SYN攻击也是这类型的攻击范例之一,其会占用所有可用服务器资源,导致服务器无法使用。

3、资源 (或应用程序) 层级攻击的目标是Web应用程序封包,并干扰主机间的资料传输。这类型攻击的范例包括违反HTTP协定、SQL注入、跨网站指令码,以及其他层级7的攻击。

网络攻击者可能会在网络上使用一种或数种类型的攻击。例如,他们一开始可能会以某种方式攻击,然后转化或合并其他攻击来破坏系统。随着攻击手法更加老练,新的网络威胁手法正持续增加,且数量可能会大幅上升。

DDoS攻击
< br > < br > < strong > IV. How to prevent DDoS attacks < / strong > < br > < br > what to do when the server is attacked by heavy traffic? In order to protect against multi-directional DDoS attacks, it is necessary to deploy a number of different strategies to mitigate different levels of attacks. In general, the more complex the attack, the more difficult it is to distinguish between attack traffic and normal traffic. The goal of the attacker is to mix with normal traffic as much as possible, thus minimizing the effectiveness of mitigation. Here are several solutions against DDoS attacks: < br > < br > < span > 1, Black Hole routing < / span > < br > < br > there is a solution for almost all network administrators: create a black hole route and send traffic into it. In the simplest form, when black hole filtering is implemented without specific restrictions, both legitimate and malicious network traffic will be routed to empty routes or black holes and discarded from the network. < br > < br > if an Internet device is attacked by DDoS, the Internet service provider (ISP) of that device may send all traffic from the site to the black hole as a defense. This is not an ideal solution because it is equivalent to enabling the attacker to achieve the desired goal: making the network inaccessible. < br > < br > < span > 2, rate limit < / span > < br > < br > limiting the number of requests received by the server in a certain period of time is also a way to protect against denial of service attacks. While rate limiting is helpful to slow down content theft by Web crawlers and protect against brute force cracking attacks, rate limiting alone may not be sufficient to effectively deal with complex DDoS attacks. < br > < br > < span > 3, Web Application Firewall < / span > < br > < br > Web Application Firewall (WAF) is an effective tool to help mitigate layer 7 DDoS attacks. When WAF is deployed between the Internet and the origin server, WAF can act as a reverse proxy to protect the target server from certain types of malicious traffic. < br > < br > can prevent layer 7 attacks by filtering requests based on a set of rules used to identify DDoS tools. One of the key values of WAF is the ability to quickly implement custom rules in response to attacks. < br > < br > < span > 4, Anycast Network Diffusion < / span > < br > < br > Anycast is a network addressing and routing method that routes incoming requests to different locations or “nodes”. In CDN, Anycast typically routes incoming traffic to the nearest data center that can handle requests efficiently. Selective routing enables Anycast networks to cope with high traffic, network congestion, and DDoS attacks. < br > < br >

Leave a Reply

Your email address will not be published. Required fields are marked *