A DDoS attack, also called denial of service attack , is a fairly basic hacking technique that drowns the servers of a website under (too) many connections, to quickly make it inaccessible. The hacker(s) use “botnets”, armed with infected computers that send requests in loops . Smartphones as well as connected devices, that is to say everything that can connect to a website, increasingly make up these botnets. A study by cloud provider Akamaï, for the last quarter of 2014, reveals the continuous increase in the effectiveness and impact of these botnets ever more efficient. The more bandwidth the botnet uses (in Gbps), the harder it will be to counter or avoid it. DDoS denial of service attack There are two types of attacks: non-distributed and distributed.
The Former Can Be Countered by a Simple Ip Ban
Coming from many more sources, are nearly impossible to counter while attacking. However, a few simple security rules applied upstream will help to ward off this threat as much as possible. Some tips to protect yourself from a DDoS attack The choice of the host , who can offer his services to Somalia Email List the different types and techniques of attacks. OVH thus offers several techniques to protect websites, such as mitigation, which filters the “illegitimate” traffic represented by botnets, or vacuuming, which uses the power of OVH’s 3 datacenters to process all requests so as not to disrupt the website. Solutions like Akamaï or Cloudfare will distribute your data over several servers around the world, to allow permanent access.
Rather Intended for Sensitive or Very Busy Sites
They are also based on the principle of decentralization. Other DDoS solutions effectively geolocate users, in order to block the flow from such a country or region, Setting up a mirror site . Certified copy of your website on another domain (for example by also buying the domain in This Fresco Data must of course be carried out upstream. Several WordPress plugins automate this process, including wp-mirror. Prepare a light version of the site . Several sites have already set up their light versions during certain major influxes (result of an election, major event), in order to have a lighter structure to load, thus relieving the bandwidth. But this version is generally less aesthetic. Set up and prepare a “whitelist” in order to restrict access, when necessary, only to technicians and site administrators, for example for maintenance operations.