9 steps for fighting against a DDoS attack in real time

Page 1

9 STEPS FOR FIGHTING AGAINST DDOS ATTACKS IN REAL-TIME www.haltdos.com | info@haltdos.com


Slow network performance or a single website downtime can cause serious revenue damage to any online business, both in lost sales and consumer trust. DDoS attacks these days have become the stuff of nightmares for website owners. If you think your business is exposed to such kind of an attack, we'd recommend you to follow these steps to protect your web resources against the different types of DDoS attacks:

1


1. Verify That There Is An Attack Find out common causes of an outage, such as DNS misconfiguration, upstream routing issues, and human error/s.

2


2. Determine The Type Of An Attack Find out the type of an attack. Is it a volumetric, protocol, or application layer attack? You can take help of DDoS mitigation service provider.

3


3. Prioritize Your Applications Make decisions in an organized way to keep your high-value applications alive. If you have limited resources and you are experiencing a DDoS attack then try to protect those applications which are crucial to your business.

4


4. Ensure Your Remote Clients White list the IP addresses of trusted remote users that require access and main list this list. Distribute the list throughout the network and with service providers as needed.

5


5. Determine Source Address Options If there is an advanced attack vector - it is impossible for your service provider to determine the no. of attack sources. Make a list of attacking IP addresses and block those IP addresses at the gateway level. Or you can also block a Geo-IP location to block the traffic coming from a specific country/city. 6


6. Mitigate Application Layer Attacks Specific application-layer attacks can be mitigated on a caseby-case basis with an implementation of DDoS mitigation solution. Today's attackers are targeting businesses with the multi-vector DDoS attacks such as HTTP flood, low and slow DDoS, etc. 7


7. Increase Your Security Perimeter If you are still experiencing issues then Focus on your application-level defenses: login walls, human detection, or Real Browser Enforcement.

8


8. Constrain Resources If all the previous steps fail to stop a DDoS attack on your network - simply constrain resources to fight an attack, like rate & connection limit is the last resort – it can turn away both good and bad traffic. Instead, you may want to disable or blackhole an application. 9


9. Manage public relations If the attack becomes public, prepare two statements first for the press and second for internal staff and admit you're being attacked If your industry policies allow it and be straightforward about it. 10


In a digital age – where a DDoS attack is likely to continue to grow it’s important for organizations need to be prepared for an attack. To Know More: Check Out This Infographic

Tips To Protect Your Business From DDoS Attacks 11


Simplifying IT Security

Web Application Firewall & DDoS Mitigation Solution

www.haltdos.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.