{"id":4374,"date":"2016-01-19T12:00:25","date_gmt":"2016-01-19T18:00:25","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=4374"},"modified":"2016-01-04T16:16:33","modified_gmt":"2016-01-04T22:16:33","slug":"how-to-prepare-for-a-ddos-attack","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/how-to-prepare-for-a-ddos-attack\/","title":{"rendered":"How to Prepare for a DDoS Attack"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva,sans-serif;\">With much of today\u2019s commercial activity conducted via the Internet, it\u2019s no wonder that corporate entities find themselves the target of assault by online intruders.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Cyber-attacks are now an accepted part of life \u2013 and it\u2019s up to administrators and security officers to establish how best to prepare and defend their organisations against them.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">DDoS?<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Distributed Denial of Service or DDoS describes an attempt by malicious attackers to render a single computer, website, network server, or other network resource inaccessible to its subscribed or intended users. A DDoS attack generally involves an attempt to disrupt or disable the services provided by a host connected to the Net.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Distinct from other types of cyber assault, a DDoS attack targets the limitations of an IT system. Large organisations may be attacked using tools which are freely available and easy to use.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_definition.png\" rel=\"attachment wp-att-4380\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4380 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_definition.png\" alt=\"DDOS_definition\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_definition.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_definition-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_definition-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">A DDoS attack is typically launched from a multitude of compromised host computers, or zombies. A group of zombies forms a botnet, which in turn is administered by a host known as the command and control server. It\u2019s a resource-intensive process, and that\u2019s why the attack is spread (Distributed) amongst an army of botnets.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Know Your Enemy<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Some operating systems actually include the tools (like ping) necessary to mount a DDoS attack. Others (like HOIC or LOIC) may be freely downloaded from the Web. There\u2019s a thriving black market in these weapons, including botnet-as-a-service and rent-a-botnet.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">One class of attack seeks to overload your network bandwidth, denying access to your services by legitimate users, who are squeezed out of the traffic flow. Another approach uses numerous small data packets to target a host, overwhelming its CPU with multitudes of cycles.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">An older school of assault looks to bring down a network by targeting a specific device, and overloading its memory capacity.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Such direct attacks may cause relatively moderate damage, as the attacking host computers consume their own resources, to stage them. The zombies typically use their own publicly available IP addresses, and can be readily identified.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Indirect attacks amplify the effect of malicious zombies by redirecting traffic from them to other hosts, which reflect or magnify the assault, and can mask the identity of the true attacker. Often, the intermediate hosts are standard Internet providers, whose services are abused by the attacker for this purpose.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Know Their Motives<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Broadly, a DDoS attack may be motivated by any of the following:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">A revenge attack, for perceived or real offences.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">As a vehicle for blackmail or extortion.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">For political purposes, as in the numerous cases allegedly instigated by governments or state-sponsored agencies.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">To gain a competitive edge over rivals.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">As a distraction for other crimes being committed at the same time.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">As a form of \u201cpopular\u201d protest, or \u201chactivism\u201d.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Know Your Weaknesses<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Establish early on which are the most vulnerable aspects of your operation. Is it your website? Or the company intranet? Your email server?<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Firm up the configurations of your OS, network settings, and applications by disabling unneeded software and services. Make a hot list of crucial services that should be kept going during an attack.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_shield.png\" rel=\"attachment wp-att-4382\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4382 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_shield.png\" alt=\"DDOS_Shield\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_shield.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_shield-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_shield-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Have a look at your endpoint and network security measures, and beef them up if necessary. Consider improved firewall protection, or devices to detect and prevent malicious intrusions. Specialist DDoS software solutions from reputable third-party manufacturers may be an option.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Stay in the Loop<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">It\u2019s not enough, to review your DDoS response strategy every 16 months (as a <a href=\"http:\/\/www.eweek.com\/security\/slideshows\/10-ways-enterprises-can-best-prepare-for-ddos-attacks.html\" rel=\"nofollow\" target=\"_blank\">survey by BT <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>of leading IT companies suggests is the norm). New threats are emerging daily, so read the blogs, join discussion forums, and study the trade literature to keep abreast of which industries are the current prime targets, who\u2019s targeting them, and the methods they use.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Ask for More<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">It may cause groans in the Finance department, but seriously consider paying upfront for additional network capacity, to give yourself a margin of error in case an attack puts unwarranted strain on your computing resources or bandwidth.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">During a DDoS attack, your website or online resource may experience loads in excess of 10 to 20 times its peak capacity, so this cushion will help mitigate the potential effect.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Know What\u2019s Normal \u2013 And What\u2019s Not<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">DDoS attacks may be complex \u2013 so it\u2019s important to know what constitutes abnormal behaviour which might indicate an assault on your system.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\"><a href=\"http:\/\/insights.wired.com\/profiles\/blogs\/5-steps-to-prepare-for-a-ddos-attack\" target=\"_blank\" rel=\"nofollow\">Monitor your network<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, and collect information on aspects such as:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Th<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">e bandwidth going into and out of all your peer-to-peer connections, network circuits, etc.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">Memory usage, network and disk I\/O, and CPU consumption on critical servers.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">The IP and port addresses of the most frequently used resources and Web destinations.<\/span><\/li>\n<li><span style=\"font-family: verdana,geneva,sans-serif;\">The most popular URLs requested during normal operations \u2013 and those currently being asked for.<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Assemble these observations and metrics at a central logging point, where they can be viewed at a single glance. This will help in spotting trends, and in locating and identifying the source and methodology of a potential attack.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Let Your People Know<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Before an attack can occur, create and distribute an action and contact list, detailing who to call (DDoS protection service, etc.; see below) and which tools to employ, in the event of an assault.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Be sure to include your Technical Support and Customer Service people, so they\u2019ll know how to respond to users should an incident occur. And your CEO will have to be informed, as well.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Create an email contact list of all parties who should be informed immediately, if your website goes down.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Ask for Help<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">You may have done so already, but engage the services of a <a href=\"http:\/\/www.cio.com\/article\/2389179\/cybercrime\/4-ways-to-prepare-for-and-fend-off-ddos-attacks.html\" target=\"_blank\" rel=\"nofollow\">specialist provider <img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>who can assist before, during, and after a DDoS attack.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Start-ups such as CloudFlare will distribute your site\u2019s load over multiple data centres, and assume responsibility for detecting and mitigating attacks for a moderate fee.<a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_protection.png\" rel=\"attachment wp-att-4381\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4381 alignright\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_protection.png\" alt=\"DDOS_protection\" width=\"370\" height=\"370\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_protection.png 370w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_protection-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2016\/01\/ddos_protection-300x300.png 300w\" sizes=\"auto, (max-width: 370px) 100vw, 370px\"><\/a><\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">If you\u2019re willing to spend upwards of $10,000 monthly, big names like Akamai Technologies, Limelight Networks, and Level 3 Communications provide such services for sites with heavy traffic loads.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Dump Your Trash<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">DDoS attacks have been known to approach 150 Gbps, generating phenomenal event logs on servers and other network devices. These overloads can soon cause failure, so don\u2019t be shy about dumping the logs once it\u2019s been established that an attack is under way, and the logs have little valuable information to contribute.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">DNS Protection<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Your Domain Name System (DNS) is often a prime target for DDoS attackers, as it\u2019s crucial to the availability of your Web services in resolving IP addresses for your users. So make sure your DNS servers are top-grade, and well-secured against intrusion.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva,sans-serif;\">Plan for The Worst<\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">\u00a0<\/span><span style=\"font-family: verdana,geneva,sans-serif;\">Stress testing during scheduled working hours will help establish the ability of your critical systems to react to abnormal loads, such as those that occur in a DDoS attack. You should also keep regularly updated records of your network infrastructure layout, inventory of network assets, and baseline values for network performance, so that existing bottlenecks can be spotted, and it will be easy to identify the target and manner of any perceived attack.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">Contingency planning is a must, so develop and distribute a check-list of procedures to be followed in case of an attack. This should include the contact information set out above, as well as the actions which each person on the list should take, and what information should be made available to them, to facilitate.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana,geneva,sans-serif;\">If your network or website goes down for a day (the typical time-frame for DDoS recovery), that day could cost you millions \u2013 to say nothing of the damage to your reputation and good will from your customers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With much of today\u2019s commercial activity conducted via the Internet, it\u2019s no wonder that corporate entities find themselves the target of assault by online intruders. \u00a0 Cyber-attacks are now an accepted part of life \u2013 and it\u2019s up to administrators and security officers to establish how best to prepare and defend their organisations against them. [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":4382,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13],"tags":[],"class_list":["post-4374","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4374","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=4374"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4374\/revisions"}],"predecessor-version":[{"id":4383,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/4374\/revisions\/4383"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/4382"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=4374"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=4374"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=4374"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}