How to choose a server to defend against CC?

Updated on technology 2024-02-20
15 answers
  1. Anonymous users2024-02-06

    CC attack is to block you by simulating a large number of visiting users, causing your server to be paralyzed, so to prevent CC attack is to block these IPs to block access to your host to view the web log is to determine whether there is an attack, record the IP of the attack, and operate the web log can be set through IIS in the "Properties" panel of the corresponding site, click the "Directory Security" tab to be under the General tab"New log plan"Make the settings and let it"Every hour or every time period"Take notes. Taihai Technology Anti-DDoS server effectively defends against DDoS and CC.

  2. Anonymous users2024-02-05

    The selection of the server should be based on its own cost and the situation of the daily attack, as well as the model configuration, and the integration is considered, it is best to choose the host room that can upgrade the defense in the future. It is proposed to consider selecting a large network bandwidth, such as Yundu network server, and building a security group or firewall to ensure data security, which can effectively defend against various DDoS attacks.

  3. Anonymous users2024-02-04

    If you want to buy a server that is anti-CC attack, you have to consult the server provider if it supports anti-CC attacks.

  4. Anonymous users2024-02-03

    Kyushu Digital Anti-DDoS server can defend against CC

  5. Anonymous users2024-02-02

    Defense CC can use 360**Guardian software,"**Guard" is a 360 subsidiary,For small and medium-sized enterprises**,Small and medium-sized e-commerce**,**Scientific research institutions**,Training and education**,Tailor-made security protection platform,The main functions are,Anti-DDoS attacks,Web application firewall and other functions。

  6. Anonymous users2024-02-01

    CC attacks are more difficult to defend against than ordinary DDoS attacks, and CC attacks do not have a large amount of traffic and occupy the memory resources of the server. The IPs from CC attacks are all real and decentralized. The packets are all normal packets, and the attack requests are all valid requests that cannot be denied.

    The specific performance is: the server can be connected, ping is no problem, but the web page is not accessible, and there is no particularly large abnormal traffic, but the duration is long, which can still cause the server to be unable to connect normally, which is very harmful.

    SCDN's anti-CC attack protection:

    Alibaba Cloud SCDN is based on the distributed architecture of Alibaba Cloud CDN and has the ability to naturally resist CC attacks. Relying on the computing power of Alibaba Cloud's Feitian platform and using deep learning algorithms, security intelligence and security policies can be quickly generated to intelligently identify large-scale attacks and proactively defend against them. Resource requests from normal users can be obtained from the SCDN node to achieve the acceleration effect.

    At present, the SCDN anti-CC protection is guaranteed at a minimum of 60,000 QPS, and the maximum elastic protection is 1 million QPS. In addition, it can customize up to 2.5 million QPS protection and support custom CC protection rules.

  7. Anonymous users2024-01-31

    What is a CC attack? CC attacks are a type of DDoS (Distributed Denial of Service) and seem to be more technical than other DDoS attacks. In the face of this type of attack situation, there is no fake IP on **, and there is no particularly large abnormal traffic, but it will cause the server to be unable to connect normally, and an ordinary user of ADSL can let a high-performance web server hang up.

    The most worrying thing is that the technical content of this attack is actually not high, as long as some special tools and some IP** are used, a beginner and intermediate computer level user can carry out DDoS attacks. 1.Periodically scans the primary node of the network.

    Since most malicious network attacks are on the master node of the network, the service provider will regularly scan the master node of the network to find possible security risks and clean them up in time.

    2.The primary node is configured with a firewall.

    Configuring a firewall on the primary node can filter out malicious network attacks, greatly improve network security and reduce the risk caused by malicious network attacks. At present, the anti-DDoS server adopts a 3D three-dimensional defense system on the backbone node, which can ignore CC attacks and defend against DDoS attacks, and can basically ignore arbitrary attacks on the network.

    3.Sufficient bandwidth redundancy.

    One of the forms of malicious network attacks is bandwidth-consuming attacks, and our common server bandwidth congestion is caused by a large number of attack packet blockages, which requires sufficient bandwidth redundancy in the computer room where the Anti-DDoS Pro server is located.

    4.Filter out unnecessary IPs and ports.

    Anti-DDoS Pro servers can filter out fake IPs on the router, close the rest of the ports and only open the service ports.

  8. Anonymous users2024-01-30

    When we find that the **server is attacked, don't panic excessively, first check whether the server has been hacked, find out the existence of the black link, and then do a good job of **security defense, turn on IP ban ping, which can prevent being scanned and close unnecessary ports. These can only prevent simple attacks, for large-traffic DDoS attacks, you must have enough bandwidth and firewalls to work together to defend, and your defense ability is greater than the attacker's attack traffic. However, the cost of individual hard defense is quite high, and enterprises can choose ink if they have requirements for cost control.

    The security cluster protection and defense capabilities are very good, and the cost is lower than that of Alibaba Cloud and NetEase Cloud.

  9. Anonymous users2024-01-29

    Currently, there are 3 types of CC attack defense:

    1. Software defense uses the firewall installed on the server to intercept, mainly on behalf of security dog, cloud lock and other software, this kind of defense is suitable for attacks with small CC attacks and obvious CC characteristics.

    2. **Program defense: Use ** program to limit the frequency of IP access, and optimize the program to reduce the number of pure static pages, reduce the dynamic situation, and reduce the pressure of CC attacks to a certain extent.

  10. Anonymous users2024-01-28

    How does the server prevent CC attacks:

    1. Unbind the domain name.

    After unbinding the domain name, the CPU of the web server can immediately return to its normal state, and the connection is normal when accessing through the IP address. However, the shortcomings are also obvious, canceling or changing the domain name brings the same to other people's access, and in addition, it is ineffective against CC attacks against IPs, even if the attacker finds out about changing the domain name, the attacker will carry out an attack on the new domain name.

    2. Change the web port.

    In general, the web server provides services through port 80, so the attacker uses the default port 80 to carry out the attack, so the web port can be modified to prevent CC attacks.

    3. IIS shielding IP

    If we find the source IP of the CC attack through the command or check the logs, we can set the IIS to block the IP access to the website, so as to prevent IIS attacks.

    4. Optimization**.

    Use caching whenever possible to store duplicate queries and reduce the overhead of duplicate data query resources. Reduce calls to complex frameworks and unnecessary data requests and processing logic. During program execution, release resources in a timely manner, such as closing MySQL connections and Memcache connections, to reduce the consumption of empty connections.

    5. Restriction measures.

    For some programs with high load, the feasible judgment methods are as follows:

    It can only be used with session information issued by ** (it can simply block centralized requests initiated by the program); Must have the correct referer (which can effectively prevent embedded attacks); Disable some client-type requests (e.g., some typical undesirable spider features); The same session can only be executed once in a few seconds.

    6. Improve the log.

    Keep access logs as complete as possible. The log analysis program can determine abnormal access as soon as possible, such as a single IP address. For example, there is a year-over-year surge in requests for specific URLs.

    How does the server prevent CC attacks:Finally, in the face of menacing CC attacks, the best solution is to choose the high-defense server of the IDC service provider.

  11. Anonymous users2024-01-27

    **The attack is generally manifested as slow access speed or inaccessible pages, and this type of attack is generally a traffic attack. Traffic attacks are generally carried out by competitors. In this case, using a general free defense will not work, and you need to purchase a professional DDoS defense CC protection service.

    For how much traffic to buy, you'd better consult your ** server provider first, they can see the attack traffic. Attacks with large traffic do not last long, usually for 3-5 days or a week. They also need to attack at a cost.

    South Korea's GSCC protection king, independent cleaning of the computer room are good protection CC tools.

  12. Anonymous users2024-01-26

    DDoS Pro can defend against CCs

    Western Digital DDOS Anti-DDoS service provides real-time anti-DDoS attack capabilities at the application layer, and can accurately identify malicious access and real visitors by means of re-authentication, identity recognition, verification code, etc., and can defend against ** CC and game CC attacks. Easily respond to DDoS and CC attacks. BGP multi-line protection, fully covering China Telecom, China Mobile and China Unicom lines.

    Web Application Firewall (WAF) Defense

    The web firewall uses thousands of defense devices, hundreds of GB of massive bandwidth, and an internal high-speed transmission network to effectively defend against various DDoS attacks and CC attacks in real time. Effectively defend against malicious intrusions and attacks, and solve abnormal problems such as web page tampering, data leakage, and unstable access.

    Anti-DDoS Pro can defend against CC

    Anti-DDoS is a security product that can defend against large-scale DDoS and high-density CC attacks, and can defend against multiple types of attacks with five-star arbitrary computer room line facilities, T-level bandwidth access, full-service field access and independent protection resources.

  13. Anonymous users2024-01-25

    Purchase professional antiddos series professional protective equipment.

  14. Anonymous users2024-01-24

    Anti-DDoS Pro servers refer to independent servers with a hard defense of more than 50 GB and Anti-DDoS Pro servers that appear for DDoS and CC traffic attacks. In the face of so many hacker attacks on the Internet, by renting a high-defense server, you can effectively weaken the traffic attack through firewalls, data monitoring and traction systems and other technologies, so as to play a preventive role. But it is also because of the defense function of the Anti-DDoS Pro server, which is the biggest difference from ordinary servers.

    1.Conduct regular scans to remove security risks.

    Most of the malicious attacks from the network are attacks on the backbone nodes, if you rent a high-defense server, IDC service providers will regularly scan the backbone nodes to find out the traffic viruses with security risks and clean them up in time, so as not to let the criminals take advantage of it.

    2.The backbone node is configured with a firewall.

    The role of the firewall is to filter malicious attacks on the network, reduce the risk caused by malicious attacks on the network, and improve network security. In addition, professional DDoS Pro servers can directly ignore CC attacks and defend against DDoS attacks, basically achieving stable and secure network operation.

    3.The bandwidth of the data center is redundant.

    Bandwidth-consuming attacks are one of the main manifestations of malicious attacks on the Internet, and a large number of attack packets will cause server bandwidth congestion, which requires sufficient bandwidth redundancy in the computer room where the Anti-DDoS Pro server is located.

    3.Ability to filter out unnecessary IPs and ports.

    Filter out fake IPs on the router and open only the service ports on the Anti-DDoS Pro server and close the rest of the ports. Or do a blocking policy on the firewall.

  15. Anonymous users2024-01-23

    Anti-DDoS Server defense CC attack: prohibit access, try to make a static page, limit the number of connections, access frequency control, restrictions, client IE verification and other series of policy rules and combination policy blocking. Yunba World IDC has many years of experience in CC protection and interception, ensuring that your ** rejects all known CC attacks, as well as a variety of customized blocking rules for customer use to defend, filter various mutant CC, so that your ** is still strong in front of CC.

    CloudDomination IDC defends against CC attacks.

Related questions
7 answers2024-02-20

It's not difficult, the hardware uses a router, the software, and the operating system uses win2003 >>>More

5 answers2024-02-20

In recent years, with the country's increasing efforts to record the record, as well as the crackdown on other relevant departments, the rise of U.S. VPS, more and more people know the benefits of U.S. VPS, and they have begun to try to use U.S. VPS. The first major benefit of the US VPS is that it does not require an ICP filing and is ready to use. Secondly, many customers think that the United States is a free country, and anyone can live in the United States, so the American space can be placed no matter what content. >>>More

6 answers2024-02-20

In the case of a certain hardware configuration of the server, the number of users is too large, which will cause the server load to be too high, if the hardware configuration cannot meet the use, the server configuration can be increased, or the server with a high configuration can be replaced If the bandwidth is small, the bandwidth can be increased Huapu**Xiao Li will answer for you.

12 answers2024-02-20

Server this thing,As long as you can provide services, whether you are DIY equipment or professional server equipment, it can be a server,Whether you are an ordinary PC or a PC server,Blade server,Small computer are the same,It's just that the assembled PC is configured to provide services,This is called a DIY server,The server is divided into high, medium and low-end,These servers are specially manufactured by equipment manufacturers to provide services for use,Configuration,Performance,Stability, etc.,There must be a difference with DIY ( The specific difference can be known according to the configuration of accessories and stress tests), this is the hardware level, the software level depends on your technical capabilities and needs to deploy different systems, different applications to achieve your needs.

9 answers2024-02-20

It is recommended that you can do a high-availability server cluster, which is what we often say, a dual-machine hot standby system, so that you can achieve the results you want, when server A goes down, server B can be replaced immediately, and there will not be too many time gaps. It will not affect your work.