Everyone, please don t think of the flood attacks of various protocols as DDOS

Updated on technology 2024-04-13
5 answers
  1. Anonymous users2024-02-07

    Generally, we refer to the inability of a network or server to provide normal services to the outside world as a denial of service, and the attack that causes a denial of service is called a denial of service attack. For example, for example, your ** is slow to open, your game is very stuck, the query data on your ** is very slow, and so on, you may be under a denial of service attack. In fact, these services can still be opened to the public, but he is no longer normal.

    The worst-case scenario is, of course, that the network is paralyzed and the server system crashes!!

    To put it simply, a denial-of-service attack is actually an attack aimed at consuming resources, consuming your limited network resources and server system resources with a large amount of useless data, because the network and the system have no way to distinguish whether the data is useful or useless, no matter what, it has to allocate resources to deal with it, if it has been processing useless data, there will be no extra resources to process normal data.

  2. Anonymous users2024-02-06

    Well, indeed. Defending against DDoS is not so simple, and free products are not defenseless.

    Here we recommend the Xiahumeng Cloud Firewall.

  3. Anonymous users2024-02-05

    1, The minimum MTU supported by Windows is 68 bytes, Windows does not limit the upper bound, but the network limits the upper bound, generally speaking, the MTU of Ethernet is about 1500, you can set it to 1600.

    2. This is determined by the initiator of the DDoS attack, generally speaking, in order to increase the burden on the attacker, the packet will be set as small as possible, such as 68 bytes. Of course, the attacker may not have paid attention to this matter, and the upper limit is set to about 1500 bytes.

    3. You are in the bottom right corner of your computer, double-click on the network icon, which is the icon of the two computers, in"Activities"You can turn on the phone for 10 minutes, then look at the number and divide the packets sent and received by 10, which is the packets processed per minute.

    If your machine is attacked by DDoS, I recommend that you use a software firewall to stop these attacks.

  4. Anonymous users2024-02-04

    No. There are many types of DDoS attacks: ICMP flood, UDP flood, NTP flood, SYN flood, CC attack, and DNS query flood.

    There are ten main ways to solve it:

    1.Expand bandwidth hard resistance 2Use a hardware firewall 3Choose high-performance equipment 4Load balancing.

    5.CDN Traffic Cleaning 6Distributed Cluster Defense 7Screening for system vulnerabilities 8System Resource Optimization 9Filter unnecessary services and port 10Restrict specific traffic.

    So of course, it's not unsolvable, plus there are many excellent anti-D services now, such as anti-D protection, etc., DDOS is not so terrifying.

  5. Anonymous users2024-02-03

    With the proliferation of DDoS attacks on the Internet, DDoS prevention efforts have become more difficult.

    So, what measures should the majority of ** users take for effective defense? Next, I will introduce the basic methods of defending against DDoS.

    1. Hide the real IP address of the server

    Server front-end plus CDN relay (free cloud acceleration, 360** guard, acceleration music, security treasure, etc.), if the funds are sufficient, you can buy a high-defense shield machine, used to hide the real IP of the server, the domain name resolution uses the IP address of the CDN, and all the resolved subdomains use the IP address of the CDN. In addition, other domain names deployed on the server cannot be resolved using real IP addresses, and all of them are resolved using CDNs.

    In addition, to prevent the server from transmitting information to leak the IP, the most common thing is that the server does not use the function of sending emails, if you have to send emails, you can send them through a third party ** (such as sendcloud), so that the IP displayed externally is the IP of **.

    2. Ensure the security of the server system.

    The first step is to ensure that the server software is free of any vulnerabilities to prevent attackers from entering. Make sure your servers are up-to-date and patched. Delete unused services from the server and close unused ports.

    For ** running on the server, make sure that it is patched up to date and that there are no security vulnerabilities.

    3. Back up data regularly.

    Tape is used to store precious data, but data backup also has huge security vulnerabilities, so the backup media should also be effectively protected during backup.

    4. Strengthen the security level of the server's local file format.

    In short, as long as the real IP of the server is not leaked, the prevention of small traffic DDoS below 10G does not cost much money, and the free CDN can cope with it. If the attack traffic exceeds 20G, then the free CDN may not be able to withstand it, and you need to buy a high-defense shield to deal with it, and the real IP of the server also needs to be hidden. Protecting sites against denial-of-service attacks includes 20G defense for Bird Cloud Liaoning and 5G for other nodes.

    They currently have events on their official website, so it is recommended to check them out!

Related questions
46 answers2024-04-13

Look at the book, anyway, if you can't devote yourself to another relationship in the short term, just keep yourself busy and don't have time to think about it.

3 answers2024-04-13

Please don't pluck the flowers, leave a beautiful piece of beauty among the flowers, be a bee musician, be a butterfly paradise. >>>More

13 answers2024-04-13

There must be such a person around us, who always agrees to other people's requests, and others wait for the result over and over again, but what they wait for is not completed. This kind of person also likes to put forward his own positive and noncommittal views on various issues, as if he is very sure of any problem. This kind of person thinks he is very capable, but in fact he is just a short man in action. >>>More

11 answers2024-04-13

You're at fault, think about it another way, what if you're the one downstairs? >>>More

11 answers2024-04-13

My husband and I met in high school.

We are now married. >>>More