Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Web host DOS attacks

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
pagerbear Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-21-04 10:49 AM
Original message
Web host DOS attacks
I found out the problem with my web host's mail server. A DOS attack. Shouldn't a host be better protected against this sort of thing? (I'm not a techie, so I don't really know.)
Printer Friendly | Permalink |  | Top
apnu Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jul-21-04 10:58 AM
Response to Original message
1. There isn't much you can do against a DOS attack.
A DOS is "Denial of Service" that means flooding the server with so many requests that it crashes. A DOS can be a general attempt to crash the machine itself or a service on the machine. Say the web host.

Since a server has to be exposed to the world in order to do its job, there isn't much you can do to stop someone from launching a DOS.

What can be done: Once a DOS has been detected, and there's a firewall protecting the server, you can configure the firewall to ignore all requests from the IP (Internet Protocol) addresses that are involved.

That's really the only defense, put what ever systems that are in between the server and the Internet (firewall, proxy services and so on) into deterrent mode for the attack itself.

Since you can't every predict where such an attack will come from, you're only choice is to wait for it to happen and react accordingly. Sadly, if the server isn't beefy enough, it might crash or slow down to the point of being crippled before the IT staff has a chance to react and defend the server from attack.

There are some firewalls that have "over flow" protection already encoded in their systems. Meaning that if the IP address and port of a server is log-jammed with information, the firewall starts ignoring the source of the log jam. Most enterprise firewalls, like the PIX from Cisco have this feature, and many SOHO (Small Office/Home Office) devices have it too. My D-Link Air-Plus wireless router/firewall has this feature too.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 04:33 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC