Defense under Linux authentication system: How to mitigate DDOS attacks, the Internet is as full of hooks as the real society, and the website is also the most troublesome thing for webmasters. In the absence of hard defense, looking for software replacement is the most direct method, such as using iptables, but iptables can not be automatically shielded, only manual shielding. Today is a software that automatically shields DDOS attacker IP: DDoS deflate. Foreword The Internet is as full of hooks as the real world. The website is also the most troublesome thing for webmasters. In the absence of hard defense, looking for software replacement is the most direct method, such as using iptables, but iptables can not be automatically shielded, only manual shielding. Today is a software that automatically shields DDOS attacker IP: DDoS deflate. Introduction to DDoS deflate DDoS deflate is a free script to defend against and mitigate DDoS attacks. It uses the netstat monitoring to track the IP addresses that create a large number of network connections. When it detects that a node exceeds the preset limit, the program will block or block these DDoS deflate official websites through APF or IPTABLES: How to confirm whether it is attacked by DDOS? Execute: netstat -ntu awk '{print \\$5}' cut -d: -f1 sort uniq -c sort -n After execution, it will display the number of connections for each IP on the server. The following are the results of my own VPS test: 1 servers) 8 220.181.61.31 VPS Detective 2311 67.215.242.196 Several IP, a dozen or dozens of connections per IP are fairly normal, if hundreds of above A thousand is definitely not normal. Install wget http://www.inetbase.com/scripts/ddos/install.sh //Download chmod 0700 install.sh //Add permissions ./install.sh //Execute 2, configure The following is the default configuration of DDoS deflate /usr/local/ddos/ddos.conf with the following contents: IGNORE_IP_LIST="/usr/local/ddos/ignore.ip.list" //IP address whitelist CRON="/etc/cron.d/ddos. Cron" //Timed execution program FREQ=1 //Check interval, default 1 minute NO_OF_CONNECTIONS=150 //Maximum number of connections, IP will be blocked if it exceeds this number, generally default ##### APF_BAN=1 ( Make sure your APF version is atleast 0.96) ##### APF_BAN=0 (Uses iptables for banning ips instead of APF) APF_BAN=1 //Use APF or iptables. It is recommended to use iptables and change the value of APF_BAN to 0. ##### KILL=0 (Bad IPs are'nt banned, good for interactive execution of script) ##### KILL=1 (Recommended setting) KILL=1 //Whether to block IP, the default is EMAIL_TO=" ;root" //When the IP is blocked, send the email to the specified mailbox. It is recommended to use it and replace it with your own mailbox. BAN_PERIOD=600 //Disable IP time, default 600 seconds, you can adjust the default configuration file according to the situation. Add the comment prompt content and modify the configuration file. If you like tossing, you can use Web stress test software to test the effect. I believe DDoS deflate can still give your VPS or server a part of DDOS attacks and give your website more protection.
Git as the worlds most advanced distributed version control system (no one), presumably many people
Under Linux is a regular software installation method in addition to binary form of software distrib
system to establish IPC communication (such as message queue, shared memory) must specify an ID valu
command not found Enter export PATH=/usr/bin:/usr/sbin:/bin:/sbin in the command line :/usr/X11R6/bi
CCIE technical theory study recommendations
Virtual Memory Management for Linux System Performance Test
Linux operating system password file security problem analysis
Linux installation of the mail command method to solve the problem of not finding the mail command
How to use a virtual drive under Linux
Simple file synchronization between Linux
Setting up the Linux system time server in the LAN
Linux Mint, Ubuntu and Red Hat comparisons
Win10 official version of the new keyboard shortcuts and touch gestures Daquan
Genuine win8 how to upgrade win10?
Microsoft responded that "the central government banned Win8": We also have Win7
LiveSino: Microsoft Windows 7 XP Mode RC version of the new feature experience
Four-step cracked "locked" registry
Detailed Description of Win 2003 Optimize Tool
Solution for Excel file corruption in U disk
WIN8 system domain users join the local Administrators group method
How to install mysql under win2000
Baidu music how to change the download path Baidu music change download path method