DDoS Security Checklist

Since the early days of the internet, DDoS had been a favorite weapon of cyber-criminals. Recently there was news about the biggest DDoS attack in history targeted towards Spamhaus, an anti-spam group. The attacks reportedly peaked at 300 Gb/s (gigabits per second) which is way over what had been seen earlier. Modern DDoS attacks are getting obscenely large for even big organizations to handle effectively.

DDOS

DDOS

What is DDoS?

DoS or Denial of Service is an attempt to make a machine or network resource unavailable to its intended users. When such a DoS is carried out by a large number of attack sources, it is called DDoS or Distributed Denial of Service.

Basic types are:

  • Consumption of computational resources
  • Disruption of configuration information
  • Disruption of state information
  • Disruption of physical network
  • Disruption of the communication media between the victim and its intended users.

How can I prevent DDoS?

While it would be incorrect to say that DDoS attacks can be prevented, the impact can be mitigated and even thwarted if your IT infrastructure is sufficiently hardened, distributed and secured. We have listed some of the preventive steps below:

  • Use rate-limiting in firewalls, routers, load balancers and other network perimeter devices.
  • Enable TCP SYN cookie protection.
  • Test your applications and deployment architecture for DoS vulnerabilities and fix them.
  • Conduct regular configuration audits of your perimeter devices.
  • Use updated software/firmware
  • Use updated Anti-virus and regularly check for malware, bots on your systems. (This way you are less likely to contribute to DDoS on others).
  • Use multiple ISPs or hosting providers for redundancy.
  • Maintain a backup site for quick switchover.
  • Install or configure network monitoring systems which can alert you as soon as any DDoS hits.
  • Check with your ISPs or hosting providers how they handle DDoS and be aware of financial implications in case you are hit with a massive DDoS.

Help I am under DDoS!! What should I do?

Dealing with a DDoS underway is incredibly difficult. The first step should be to try to understand the type and source of the attack. Understanding the attack type greatly helps in effectively dealing with the attack. Some of the things that you may consider are:

  • Blackholing and sinkholing
  • Enable rate-limiting in firewalls, routers, load balancers and other network perimeter devices.
  • Obtain a new IP address or range from your ISP or hosting provider if the attacker is targeting an IP address or range. If you have multiple ISPs then try switching your primary ISP.
  • Switch to something like Akamai, Cloudflare or Incapsula who have known expertise to handle DDoS.

What to do post the incident?

  • Conduct a root cause analysis and ensure that no other malicious activity was done on your servers other than DDoS.
  • If blackholing or sinkholing was done, restore the same.
  • If the preventive measures listed above are missing, you may consider implementing some of them to be better prepared.

One Response

  1. Karman Apte August 13, 2013
Games Security
Microlearning
Microlearning: Why It Isn’t a ‘Trend’ Anymore?
Design
4 Web Design Trends that are going to Dominate the Market in 2017
Internet Privacy
Here’s why you should take your Internet Privacy seriously (and secure it) in the Trump era
External Giveaway Freebie TechnoGiants Giveaway
Focusky Pro
Giveaway #41: Focusky Pro 3-months Plan Subscription
MacXDVD
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Flipbook
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
Android iPhone
iOS 11
8 Really Unknown Features of iOS 11 Entering in your iPhone
iOS Application Development
9 Benefits to Choose iOS Application for Your Business
Office Apps
9 Best Office Apps for Android for Better Productivity
Adsense
Marketing
It’s A New Era of Marketing – Search Engine Optimization
Link Building Strategies
Link Building Strategies for Your Website in 2017
Guest Posting
6 Tips to Maximise Your SEO Efforts with Guest Posting
MAC Software
Technology
How Technology Has Changed the Way of Shopping
Lotus Notes
How To Setup Archive Lotus Notes Emails To Local Disk & Save Locally
Business
Poor Employers in the Age of Technology
Blogging Social Media
Earning
Top 5 Strategies and Concepts for Earning Online Through Blogging
Best Apps
12 of the Best Apps for On-the-Go Bloggers in 2017
Go Viral
10 Magical Tactics to Make Your Content Go Viral!
Mobile Technology
Infographic: How Mobile Technology Can Impact Your Sales
Social Media
Infographic: Social Media Behaviors to Avoid in 2017
Social Video
Infographic: 3 ways Social Video Marketing can Propel your Brand
Data Entry
Infographic: Should You Outsource Your Data Entry? Here are 5 Questions to Ask!