Several methods of server protection against ddos attacks

While enjoying the convenience and efficiency brought by the Internet to our enterprises, more and more virus Trojan horses also annoy small and medium-sized enterprises. Faced with the endless patterns of viruses, cyber hackers and security incidents, how should we protect ourselves as enterprises?
Several methods for DDoS attacks against high-defense servers are as follows:
1. Ensure that all servers use the latest systems and are marked as safe patch. The Computer Emergency Response Coordination Center found that almost every system attacked by DDoS was not patched in time.

2. Make sure that the administrator checks all hosts, not just key hosts.

3. Make sure to delete unused services such as FTP or NFS from the corresponding directory or file database of the server.

4. Ensure that all services running on Unix have TCP wrappers to restrict access to the host.

5. Restrict sharing with network files outside the firewall. This will give hackers a chance to intercept system files and replace them with Trojan horses. The file transfer function will be paralyzed.

6. Make sure you have an up-to-date network topology map. This picture should specify TCP/IP addresses, hosts, routers, and other network equipment in detail. It should also include network boundaries, demilitarized zones (DMZ), and internal confidentiality of the network.

7. Run a port mapping program or port scanning program on the firewall. Most of the incidents are caused by improper firewall configuration, which makes the success rate of DoS/DDoS attacks very high, so you must carefully check the privileged ports and unprivileged ports.

Guess you like

Origin blog.csdn.net/weixin_45841668/article/details/108519570