In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-16 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >
Share
Shulou(Shulou.com)05/31 Report--
Today, I would like to talk to you about how to solve the attack on the website. Many people may not know much about it. In order to make you understand better, the editor has summarized the following content for you. I hope you can gain something according to this article.
The website is attacked, this is a problem that many webmasters will encounter, if you do not encounter, then there may be two situations
First, you have no competitor. You are the only one who does this on the Internet.
Second, your website is not good, not competitive, can not affect others. If it is not the above two cases, as long as your website does well, it will be attacked to varying degrees.
So what are the reactions of the attacked websites? Generally speaking, the visit to the website is unstable, slow, the card can not even be opened. After the emergence of this situation, it will affect the ranking of the site in Baidu, and customers visit such a site, if you can't open it for a few seconds, you won't read it again. You not only lost your ranking in Baidu, but also lost a lot of customers.
As a result, there will be a lot of people scold the attacker, but also some suggestions to add hard defense. Everyone has expertise, perhaps webmasters are familiar with website construction and network promotion, but they may not necessarily understand the attack on the website. Here I will share some knowledge of anti-attack with you.
Attack: attack websites are generally divided into three categories, namely ARP spoofing attack, CC attack, DDOS traffic attack.
First, let's talk about ARP spoofing attacks: if you want to launch ARP spoofing attacks, you must first take control of the server in the same computer room, the same IP segment and the same VLAN as the website, and invade other servers. After gaining control, the program is used to disguise the controlled machine as a gateway to deceive the target server. This kind of attack usually sneaks into the code in the web page or intercepts some usernames and passwords. It is easy to deal with this kind of attack, just inform the computer room to deal with the corresponding controlled machines.
Second, CC attack: relatively speaking, this kind of attack is more harmful. Host space has one parameter? IIS? The number of connections, when the visited site exceeds the number of IIS connections, the site will appear Service Unavailable. The attacker uses the controlled machine to continuously send access requests to the attacked website, forcing the number of IIS connections to exceed the limit. When the CPU resources or bandwidth resources are exhausted, then the website will be destroyed.
For CC attacks, it is OK to rent a server that protects against CC attacks.
Third, traffic attack: it is DDOS attack, the harm of this kind of attack is the greatest. The principle is to send a large number of packets to the target server, occupying its bandwidth. For traffic attacks, simply adding a firewall is useless, there must be enough bandwidth to cooperate with the firewall in order to defend. If you want to defend against 10-gigabyte traffic attacks, you must use about 20 gigabytes of hardware firewall plus nearly 20 gigabytes of bandwidth. The only way to deal with DDOS attacks is to buy high-defense servers to prevent DDOS attacks.
In order to effectively solve DDOS and other attacks, Express Technology has joined hands with Huzhou Telecom to build a top security protection system. So far, it can effectively handle DDOS attacks with large packets of SYN Flood, ACK Flood, ICMP Flood, UDP Flood and DNS Flood under 100G. And can effectively deal with small packets: connection exhaustion HTTP Get Flood, DNS Query Flood, CC attacks and so on. Is by far the most professional security protection IDC operators.
After reading the above content, do you have any further understanding of how to solve the problem when the website is attacked? If you want to know more knowledge or related content, please follow the industry information channel, thank you for your support.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.