Thread Rating:
  • 3 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Breakdown of DDOS Attack Prevention
#11
Slowloris / GET flood (Http flood) = Site level (needs a response from the HTTPD)
Syn flood = server level (needs server to accept syn and send a Syn-ACK
UDP / Pingflood = Router level (Connectionless Spams router without need for a reply from server).

Am i close?

and all of them would be router level with a big enough botnet?
Reply
#12
Slowloris is more complicated than simple get commands. It opens the HTTP connection but doesn't ever close it. What you describe is simple httpd flood which is easily blocked mostly.

Syn floods are normally easy to stop too if you have a capable sys admin. 99% of attacks I have seen had a pattern that was recognizable enough for me to block them at server level.

UDP/Ping are funny since these are services you can normally just turn off or reroute. You can just do DNS mirrors or round-robin DNS to avoid large botnet attacks. DNS service can easily be moved to a host offering good DDOS protection at a fairly reasonable price too.

Ping flood is just a complete waste of everyones time.

Everything can be stopped at router level but the risk of false positives grows. Best to use all 3 protection layers appropriately.
Superman I am here to rescue you.
This is Support Forums not Support PMs.  Do not PM me for support unless it's private and site related.
Reply
#13
(08-25-2010, 11:16 PM)Omniscient Wrote: Slowloris is more complicated than simple get commands. It opens the HTTP connection but doesn't ever close it. What you describe is simple httpd flood which is easily blocked mostly.

Syn floods are normally easy to stop too if you have a capable sys admin. 99% of attacks I have seen had a pattern that was recognizable enough for me to block them at server level.

UDP/Ping are funny since these are services you can normally just turn off or reroute. You can just do DNS mirrors or round-robin DNS to avoid large botnet attacks. DNS service can easily be moved to a host offering good DDOS protection at a fairly reasonable price too.

Ping flood is a just. Complete waste of everyones time.

Everything can be stopped at router level but the risk of false positives grows. Best to use all 3 protection layers appropriately.
Yeah, a few datacenters have Cisco's and other HWFW routers You have to pay loads but i did once and it was worth having the access ^^.

my site mainly gets hit by Get floods on heavier pages. (the occasional slowloris) httpflood i just block with a php script to add "spamming" Ip's to the htaccess block list. Slowloris i haven't figured yet, buy instead of spamming it holding connections i can't find a rule to detect it. Surprised apache haven't done something about it yet.
Reply
#14
Thanks for this info but I really wanted to know more about this
Reply
#15
Is there any way to prevent DDoS attacks from say, XBL? (People trying to host boot)
Reply
#16
Thanks for the information, my knowledge enriched.
Reply
#17
Can you please if there is any anti-ddoser code.
Reply
#18
This is very helpful information. I'm not very knowledgeable when it comes to DDoS attacks and I've always wondered, why is it that some websites are harder to DDoS than others? Government websites for example.. Is it just that they know how to deal with them better & quicker than most people?

Sorry if it sounds a dumb question...
Reply
#19
this was very useful and helpful for me Smile

Omni is GoD
Reply
#20
This is greatly broken down, actually. I always figured it wouldn't be as simply said as Omni has shown so.
I use round robin for my servers, although I don't recieve attacks like omni does, It does just fine.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  DDOS Prevention mcdl 42 13,208 10-17-2011, 08:37 AM
Last Post: ZooT ツ

Forum Jump:


Users browsing this thread: 1 Guest(s)