DDoS Security Checklist

Since the early days of the internet, DDoS had been a favorite weapon of cyber-criminals. Recently there was news about the biggest DDoS attack in history targeted towards Spamhaus, an anti-spam group. The attacks reportedly peaked at 300 Gb/s (gigabits per second) which is way over what had been seen earlier. Modern DDoS attacks are getting obscenely large for even big organizations to handle effectively.

DDOS

DDOS

What is DDoS?

DoS or Denial of Service is an attempt to make a machine or network resource unavailable to its intended users. When such a DoS is carried out by a large number of attack sources, it is called DDoS or Distributed Denial of Service.

Basic types are:

  • Consumption of computational resources
  • Disruption of configuration information
  • Disruption of state information
  • Disruption of physical network
  • Disruption of the communication media between the victim and its intended users.

How can I prevent DDoS?

While it would be incorrect to say that DDoS attacks can be prevented, the impact can be mitigated and even thwarted if your IT infrastructure is sufficiently hardened, distributed and secured. We have listed some of the preventive steps below:

  • Use rate-limiting in firewalls, routers, load balancers and other network perimeter devices.
  • Enable TCP SYN cookie protection.
  • Test your applications and deployment architecture for DoS vulnerabilities and fix them.
  • Conduct regular configuration audits of your perimeter devices.
  • Use updated software/firmware
  • Use updated Anti-virus and regularly check for malware, bots on your systems. (This way you are less likely to contribute to DDoS on others).
  • Use multiple ISPs or hosting providers for redundancy.
  • Maintain a backup site for quick switchover.
  • Install or configure network monitoring systems which can alert you as soon as any DDoS hits.
  • Check with your ISPs or hosting providers how they handle DDoS and be aware of financial implications in case you are hit with a massive DDoS.

Help I am under DDoS!! What should I do?

Dealing with a DDoS underway is incredibly difficult. The first step should be to try to understand the type and source of the attack. Understanding the attack type greatly helps in effectively dealing with the attack. Some of the things that you may consider are:

  • Blackholing and sinkholing
  • Enable rate-limiting in firewalls, routers, load balancers and other network perimeter devices.
  • Obtain a new IP address or range from your ISP or hosting provider if the attacker is targeting an IP address or range. If you have multiple ISPs then try switching your primary ISP.
  • Switch to something like Akamai, Cloudflare or Incapsula who have known expertise to handle DDoS.

What to do post the incident?

  • Conduct a root cause analysis and ensure that no other malicious activity was done on your servers other than DDoS.
  • If blackholing or sinkholing was done, restore the same.
  • If the preventive measures listed above are missing, you may consider implementing some of them to be better prepared.

One Response

  1. Karman Apte August 13, 2013
Games Security
Best Web Designing Tools
Best Web Designing Tools You Can’t Live Without
Email Marketing Software
How to Choose Your Email Marketing Software for Your Business?
Live Chat
4 Reasons Why Live Chat is the Ideal Solution for Customer Support
External Giveaway Freebie TechnoGiants Giveaway
Focusky Pro
Giveaway #41: Focusky Pro 3-months Plan Subscription
MacXDVD
Freebie: MacXDVD Gives Away 10K Free Copies of MacX Video Converter
Flipbook
Giveaway #40: FlipHTML5 Flipbook 3-months Platinum Plan Subscription
Android iPhone
App Builder
7 Excellent Mobile App Builders for Personal and Professional Apps
Android Device
How to Keep Your Data Safe and Secure On Your Android Device?
Android Phones
Exciting Features of Android Phones you Probably Didn’t Know
Adsense
Guest Posting
6 Tips to Maximise Your SEO Efforts with Guest Posting
On-Page SEO
5 Ways Content Editors can kill your On-page SEO
On Page Optimization
Understand the effectiveness and important of On Page Optimization
MAC Software
Best VPN Service
How to Choose the Best VPN Service for Torrenting?
Technology Integration
5 Ways Technology Integration Will Help You Get More Business
Accessories
5 Must Have Portable Accessories in 2017
Blogging Social Media
Blog
5 Effective Ways To Save Time While Writing Blog Posts
Facebook Marketing
6 Tips for Using Video Marketing on Facebook
Time Management
8 Time Management Strategies for Fellow Bloggers
Data Entry
Infographic: Should You Outsource Your Data Entry? Here are 5 Questions to Ask!
Content Writing
Infographic: 7 Reasons Why Content Is Still King in 2017
Email Marketing
Infographic: The Giant Email Marketing Statistics Guide
Ecommerce
Infographic: How to Create Your Ecommerce Store With Magento