The server has been attacked, is there any solution?

As a network security operation and maintenance personnel, it is necessary to maintain the security of the system, repair known system vulnerabilities, etc., and at the same time, when the server is attacked, it is necessary to quickly deal with the attack to minimize the impact of the attack on the network.
A network attack refers to an attack by a user on the hardware, software and data in the network by exploiting the loopholes and security flaws in the network.

There are many kinds of network attacks. Commonly used attacks on the network include DDOS attacks, SYN attacks, ARP attacks, Trojan horses, viruses, etc. No matter how secure the server is, network attacks cannot be avoided. As a network security operation and maintenance personnel, it is necessary to maintain the security of the system, repair known system vulnerabilities, etc., and at the same time, when the server is attacked, it is necessary to quickly deal with the attack to minimize the impact of the attack on the network. So what should be done after the server is attacked? Generally, the following steps can be followed: The
The server has been attacked, is there any solution?
server is attacked, is there any solution?
As a network security operation and maintenance personnel, it is necessary to maintain the security of the system, repair known system vulnerabilities, etc., and at the same time, when the server is attacked, it is necessary to quickly deal with the attack to minimize the impact of the attack on the network.

Author: Jayson Source: Computer and Mobile Hacker | 2018-04-09 09:31 Collection and Sharing
Technology Salon | On April 21, a number of blockchain experts interpreted the application scenarios of blockchain technology!

A network attack refers to an attack by a user on the hardware, software and data in the network by exploiting the loopholes and security flaws in the network.

There are many kinds of network attacks. Commonly used attacks on the network include DDOS attacks, SYN attacks, ARP attacks, Trojan horses, viruses, etc. No matter how secure the server is, network attacks cannot be avoided. As a network security operation and maintenance personnel, it is necessary to maintain the security of the system, repair known system vulnerabilities, etc., and at the same time, when the server is attacked, it is necessary to quickly deal with the attack to minimize the impact of the attack on the network. So what should you do after the server is attacked? Generally, you can follow the following steps:

1. Disconnect all network connections.

The reason why the server is attacked is because it is connected to the network. Therefore, after confirming that the system is under attack, the first step must be to disconnect the network connection, that is, disconnect the attack.

2. Find the attacker according to the log.

Analyze according to system logs, check all suspicious information for troubleshooting, and find out the attacker.
The server has been attacked, is there any solution?
3. Analyze system vulnerabilities based on logs.

Analyze the system log to see how the attacker invaded the server, and find out the loopholes in the system through analysis.

Fourth, backup system data.

When backing up system data, be sure to pay attention to whether the backed up data contains attack sources, and if so, delete it in time.

Fifth, reinstall the system.

After being attacked, the system must be reinstalled, because we cannot fully confirm which attack methods the attacker uses to attack, so only after the system is reinstalled can the source of the attack be completely eliminated.

6. Import secure data.

After reinstalling the system, import the safe data information into the system, and check whether there are other loopholes or hidden dangers in the system, and repair them in time if there are any.

Seven, restore the network connection.

After everything is normal, connect the system to the network and restore service.

【Editor's Choice】

Four tricks to teach you to quickly solve the DNS server not responding to
WeChat Open HC performance optimization framework: Solve the historical problem of mobile phone "stuck into a dog"
Website server selection: Windows VS Linux
What qualities do you need to become a cross-disciplinary "solution architect"?
Six attack surfaces of IoT devices and how to deal with them.
Detailed consultation QQ: 228460192

Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=324482907&siteId=291194637