DDOS Prevention Settings in CSF firewall

By | 2018-08-16T01:43:45+00:00 December 13th, 2016|

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are common threats that every publicly accessible web server faces. PORTFLOOD and SYNFLOOD are the two directives in CSF firewall to prevent DDOS. SYNFLOOD is disabled by default, but if you are expecting an attack you should enable it and set the rules. Follow [...]

What is MAC Flooding? How to prevent it?

By | 2018-08-16T01:54:31+00:00 October 28th, 2016|

MAC Flooding MAC Flooding is one of the most common network attacks. Unlike other web attacks,  MAC Flooding is not a method of attacking any host machine in the network, but it is the method of attacking the network switches. However, the victim of the attack is a host computer in the network. We are [...]

What is IP Spoofing? Types of IP Spoofing

By | 2018-08-16T01:55:00+00:00 October 14th, 2016|

What is IP Spoofing Before discussing about IP spoofing, let's see take a look at IP addresses. An IP address is a unique set of numbers which separated with the full stops which is used to identify each computer using the Internet Protocol to communicate over a network. IP spoofing can be defined as an [...]

What is SYN Flood attack and how to prevent it?

By | 2018-08-29T20:20:12+00:00 October 14th, 2016|

A SYN flood is a form of denial-of-service attack in which an attacker sends a progression of SYN requests to an objective's framework trying to consume enough server assets to make the framework inert to authentic activity.   TCP three-way handshake Typically, when a customer begins a TCP connection with a server, the customer and [...]

Installing and Configuring Linux DDOS Deflate

By | 2018-08-16T17:29:46+00:00 September 22nd, 2016|

DDOS (Distributed Denial of Service) is a type of DOS (Denial of Service) attack in which an online service is made unavailable to its intended users. This is a frequently encountered attack due to availability of various tools online that are made to target a wide variety of important resources.  These tools are easy to [...]

How to Troubleshoot a DDoS Attack?

By | 2018-08-12T16:15:43+00:00 September 8th, 2016|

What is a DDoS attack? DDoS stands for Distributed Denial of Service. It is a variant of the infamous DoS attack. A DoS attack is a type of attack that the attackers stops the service so that the legitimate users also cannot access the service.The attack will be from a single computer system. This is achieved [...]