Welcome
Username or Email:

Password:


Missing Code




[ ]
[ ]
Online
  • Guests: 31
  • Members: 0
  • Newest Member: omjtest
  • Most ever online: 396
    Guests: 396, Members: 0 on 12 Jan : 12:51
Members Birthdays:
All today's birthdays', congrats!
ramses (16)
Arcstarter (31)
Zak (15)


Next birthdays
05/12 Colin 99 (53)
05/14 hvguy (41)
05/14 thehappyelectron (14)
Contact
If you need assistance, please send an email to forum at 4hv dot org. To ensure your email is not marked as spam, please include the phrase "4hv help" in the subject line. You can also find assistance via IRC, at irc.shadowworld.net, room #hvcomm.
Support 4hv.org!
Donate:
4hv.org is hosted on a dedicated server. Unfortunately, this server costs and we rely on the help of site members to keep 4hv.org running. Please consider donating. We will place your name on the thanks list and you'll be helping to keep 4hv.org alive and free for everyone. Members whose names appear in red bold have donated recently. Green bold denotes those who have recently donated to keep the server carbon neutral.


Special Thanks To:
  • Aaron Holmes
  • Aaron Wheeler
  • Adam Horden
  • Alan Scrimgeour
  • Andre
  • Andrew Haynes
  • Anonymous000
  • asabase
  • Austin Weil
  • barney
  • Barry
  • Bert Hickman
  • Bill Kukowski
  • Blitzorn
  • Brandon Paradelas
  • Bruce Bowling
  • BubeeMike
  • Byong Park
  • Cesiumsponge
  • Chris F.
  • Chris Hooper
  • Corey Worthington
  • Derek Woodroffe
  • Dalus
  • Dan Strother
  • Daniel Davis
  • Daniel Uhrenholt
  • datasheetarchive
  • Dave Billington
  • Dave Marshall
  • David F.
  • Dennis Rogers
  • drelectrix
  • Dr. John Gudenas
  • Dr. Spark
  • E.TexasTesla
  • eastvoltresearch
  • Eirik Taylor
  • Erik Dyakov
  • Erlend^SE
  • Finn Hammer
  • Firebug24k
  • GalliumMan
  • Gary Peterson
  • George Slade
  • GhostNull
  • Gordon Mcknight
  • Graham Armitage
  • Grant
  • GreySoul
  • Henry H
  • IamSmooth
  • In memory of Leo Powning
  • Jacob Cash
  • James Howells
  • James Pawson
  • Jeff Greenfield
  • Jeff Thomas
  • Jesse Frost
  • Jim Mitchell
  • jlr134
  • Joe Mastroianni
  • John Forcina
  • John Oberg
  • John Willcutt
  • Jon Newcomb
  • klugesmith
  • Leslie Wright
  • Lutz Hoffman
  • Mads Barnkob
  • Martin King
  • Mats Karlsson
  • Matt Gibson
  • Matthew Guidry
  • mbd
  • Michael D'Angelo
  • Mikkel
  • mileswaldron
  • mister_rf
  • Neil Foster
  • Nick de Smith
  • Nick Soroka
  • nicklenorp
  • Nik
  • Norman Stanley
  • Patrick Coleman
  • Paul Brodie
  • Paul Jordan
  • Paul Montgomery
  • Ped
  • Peter Krogen
  • Peter Terren
  • PhilGood
  • Richard Feldman
  • Robert Bush
  • Royce Bailey
  • Scott Fusare
  • Scott Newman
  • smiffy
  • Stella
  • Steven Busic
  • Steve Conner
  • Steve Jones
  • Steve Ward
  • Sulaiman
  • Thomas Coyle
  • Thomas A. Wallace
  • Thomas W
  • Timo
  • Torch
  • Ulf Jonsson
  • vasil
  • Vaxian
  • vladi mazzilli
  • wastehl
  • Weston
  • William Kim
  • William N.
  • William Stehl
  • Wesley Venis
The aforementioned have contributed financially to the continuing triumph of 4hv.org. They are deserving of my most heartfelt thanks.
Forums
4hv.org :: Forums :: Computer Science
« Previous topic | Next topic »   

DDOS

Move Thread LAN_403
Thomas W
Mon Jun 04 2012, 01:24PM Print
Thomas W Registered Member #3324 Joined: Sun Oct 17 2010, 06:57PM
Location:
Posts: 1276
hey guys,

im getting DDOS every now and again,
is there a VPN or simler that is good and will stop a 10 - 50GB/s STORM DDOS?
Back to top
Pinky's Brain
Mon Jun 04 2012, 03:29PM
Pinky's Brain Registered Member #2901 Joined: Thu Jun 03 2010, 01:25PM
Location:
Posts: 837
If you have 10-50 GB/s incoming a VPN won't do much for you, unless you have an ungodly wide pipe to the internet ... your only option is to use a different ISP with a different IP until your old ISP fixes things (or the DDOS kiddy gets tired).
Back to top
Thomas W
Mon Jun 04 2012, 07:35PM
Thomas W Registered Member #3324 Joined: Sun Oct 17 2010, 06:57PM
Location:
Posts: 1276
yeh, say thanks to Devnull, its sold for about £30 but you can buy upgrades for up to 50Gb/s

it was created for lil kids who couldnt take being banned or kicked off a gmod server
Back to top
Carbon_Rod
Fri Jun 22 2012, 06:48AM
Carbon_Rod Registered Member #65 Joined: Thu Feb 09 2006, 06:43AM
Location:
Posts: 1155
...or you could simply configure your firewall to "stealth" and rate-limit your web server (considered rude) with Geo-IP based blocking... and most open proxies limit bandwidth too...
Block lists are usually updated daily:
Link2
Link2

Security policies are always changing, and this group offers workshops for junior people:
Link2

Some search engine spiders are very aggressive, and "baidu" is known to poke around areas never publicly linked. Notably, this usually indicates a site will be added to a malware distributor network in a few weeks.

For fun, you should change your server signature to IIS7 if running an nGinx or Apache reverse load balancing proxy for dynamic cloud hybrid appliance instances on rackspace.com or amazon.

There are other responsive options, but usually the source IP are from some innocent individuals infected by a video-game or tool-bar.

If I recall, 4hv has policies against discussing these types if issues on the site.

Cheers,
Rod
Back to top
Steve Conner
Fri Jun 22 2012, 07:43AM
Steve Conner Registered Member #30 Joined: Fri Feb 03 2006, 10:52AM
Location: Glasgow, Scotland
Posts: 6706
I haven't a clue what Rod is talking about so I can't say if it violates the site rules or not. smile

The easiest solution is to wait until your ISP bans you for bringing a massive DDOS on them, then find a new ISP.
Back to top
Ash Small
Fri Jun 22 2012, 08:30AM
Ash Small Registered Member #3414 Joined: Sun Nov 14 2010, 05:05PM
Location: UK
Posts: 4245
I'm not sure if this is any help or not:

Peer-to-peer attacks

"Attackers have found a way to exploit a number of bugs in peer-to-peer servers to initiate DDoS attacks. The most aggressive of these peer-to-peer-DDoS attacks exploits DC++. Peer-to-peer attacks are different from regular botnet-based attacks. With peer-to-peer there is no botnet and the attacker does not have to communicate with the clients it subverts. Instead, the attacker acts as a "puppet master," instructing clients of large peer-to-peer file sharing hubs to disconnect from their peer-to-peer network and to connect to the victim's website instead. As a result, several thousand computers may aggressively try to connect to a target website. While a typical web server can handle a few hundred connections per second before performance begins to degrade, most web servers fail almost instantly under five or six thousand connections per second. With a moderately large peer-to-peer attack, a site could potentially be hit with up to 750,000 connections in short order. The targeted web server will be plugged up by the incoming connections.

While peer-to-peer attacks are easy to identify with signatures, the large number of IP addresses that need to be blocked (often over 250,000 during the course of a large-scale attack) means that this type of attack can overwhelm mitigation defenses. Even if a mitigation device can keep blocking IP addresses, there are other problems to consider. For instance, there is a brief moment where the connection is opened on the server side before the signature itself comes through. Only once the connection is opened to the server can the identifying signature be sent and detected, and the connection torn down. Even tearing down connections takes server resources and can harm the server.

This method of attack can be prevented by specifying in the peer-to-peer protocol which ports are allowed or not. If port 80 is not allowed, the possibilities for attack on websites can be very limited."

From Wikipedia

Link2
Back to top
Hon1nbo
Fri Jun 22 2012, 11:08PM
Hon1nbo Registered Member #902 Joined: Sun Jul 15 2007, 08:17PM
Location: North Texas
Posts: 1040
DDoS commonly uses one of two popular methods: malformed packets (which take more time and resources to processes, and hence can be easier for the attacker to execute), or just simple massive floods of the same requests.

Hardware firewalls have started including procedures for dealing with both of these. Floods of identical packets will start being dropped or limited by the firewall, and malformed packets designed to consume resources processing simply never make it to the server.

Of course, hardware firewalls cost money, and I personally don't know of a reliable software solution.


As mentioned try to make use of IP Blacklists, which will have a lot of botnet machines on them.

If you need any specific help and don't want to post details feel free to PM me. I actually help run a Security group at my university, and currently there is not much we are doing over this summer.

-Jimmy
Back to top

Moderator(s): Chris Russell, Noelle, Alex, Tesladownunder, Dave Marshall, Dave Billington, Bjørn, Steve Conner, Wolfram, Kizmo, Mads Barnkob

Go to:

Powered by e107 Forum System
 
Legal Information
This site is powered by e107, which is released under the GNU GPL License. All work on this site, except where otherwise noted, is licensed under a Creative Commons Attribution-ShareAlike 2.5 License. By submitting any information to this site, you agree that anything submitted will be so licensed. Please read our Disclaimer and Policies page for information on your rights and responsibilities regarding this site.