{"id":2587,"date":"2014-01-06T18:44:48","date_gmt":"2014-01-06T18:44:48","guid":{"rendered":"http:\/\/blog.365ezone.com\/?p=2587"},"modified":"2014-01-06T18:44:48","modified_gmt":"2014-01-06T18:44:48","slug":"what-are-ddos-attacks-how-to-deal-with-them","status":"publish","type":"post","link":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/","title":{"rendered":"What are DDoS Attacks &#038; How to Deal with them"},"content":{"rendered":"<p>The internet is abuzz with talks of the <a href=\"http:\/\/techcrunch.com\/2012\/09\/10\/godaddy-outage-takes-down-millions-of-sites\/\" target=\"_blank\">recent outage faced by Domain Registrar Godaddy<\/a>. The outage was suspected to be because of a Distributed Denial of Service Attack (commonly known as a DDoS attack) that targeted Godaddy\u2019s DNS servers, affecting several websites as well as email services. <em>(However, a recent statement by Godaddy mentions that it was an internal network error that caused the interruption in services)<\/em><\/p>\n<p>DDoS attacks are a fairly common occurrence on the internet and are something we\u2019ve experienced in the past as well. Here is some more information on DDoS attacks, who they affect and how we mitigate such attacks.<\/p>\n<p><strong>What is a DDoS attack?<\/strong><br \/>\n<a href=\"https:\/\/i0.wp.com\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" title=\"Elements of a DDoS Attack\" alt=\"\" src=\"https:\/\/i0.wp.com\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png?resize=307%2C434\" width=\"307\" height=\"434\" \/><\/a>A <strong>Denial of Service attack<\/strong> aims to make a website unavailable to users by flooding the website\u2019s servers with an extremely high number of requests. These multiple incoming requests can make website resolution exceedingly slow and can even cause servers to crash.<\/p>\n<p>A <strong>Distributed Denial of Service (DDoS) attack<\/strong> is essentially a DoS attack that originates from multiple sources. Such attacks are usually carried out using thousands of unsuspecting zombie machines known as <a href=\"http:\/\/en.wikipedia.org\/wiki\/Botnet\" target=\"_blank\">botnets<\/a>.<\/p>\n<p>DDoS attacks have traditionally been used by cyber criminals to extort money from website owners that rely on the accessibility of their websites. However \u2018<em>Hacktivists<\/em>\u2019 have also initiated such attacks in the past to bring down company and government websites in protest of certain policies or decisions.<\/p>\n<p><em>A \u00a0popular recent example is <a href=\"http:\/\/www.informationweek.com\/security\/attacks\/anonymous-retaliates-for-megaupload-raid\/232500183\" target=\"_blank\">anonymous\u2019 attack<\/a> in protest of the Megaupload Raids that targeted various government and music industry sites.<\/em><\/p>\n<p><strong>Who can it affect?<\/strong><\/p>\n<p><strong><\/strong>DDoS attacks are difficult to safeguard against completely and can affect <strong>large and small websites<\/strong> alike.<\/p>\n<p>Having suffered a DDoS attack on our DNS servers in the past, we understand that such attacks can occur and the best solution is to have systems in place that allow you to mitigate the attack and get systems back online as soon as possible.<\/p>\n<p><strong>Which leads us to \u2013 How do we mitigate DDoS attacks?<\/strong><\/p>\n<p><strong><\/strong>While there isn\u2019t a lot that can be done to prevent DDoS attacks, there are certain techniques that we employ to mitigate DDoS attacks and restore services.<\/p>\n<p>To help mitigate DDoS attacks we\u2019ve employed the services of <strong><a href=\"http:\/\/www.prolexic.com\/index.html\" target=\"_blank\">Prolexic Technologies<\/a><\/strong> that is a global leader in DDoS Protection &amp; Mitigation. While there are multiple ways in which Prolexic helps mitigate DDoS attacks, here is a simplified version of how Prolexic works.<\/p>\n<ul>\n<li><strong>BGP Routing:<\/strong><br \/>\nWith BGP routing, when a DDoS attack occurs, our <strong>traffic gets routed through Prolexic\u2019s servers<\/strong> where malicious and legitimate traffic is segregated and legitimate users can continue to access our services.<\/li>\n<li><strong>Advanced Filtering:<br \/>\n<\/strong>As the traffic gets routed through Prolexic\u2019s servers, their filtering technology <strong>identifies anomalies<\/strong> which are then \u201cred flagged\u201d by the system. Moreover, research is then conducted by Prolexic engineers to determine whether this activity should be blocked on the network. Once <strong>malicious activity has been determined<\/strong>, it is <strong>labeled in the system and blocked<\/strong>.<\/li>\n<\/ul>\n<p><em>How can you independently mitigate attacks?<\/em><br \/>\nAs a individual website owner you have limited control over a server but you can use <strong>CloudFlare<\/strong> to protect your websites from attacks.<\/p>\n<p>CloudFlare protects your websites by\u00a0<strong>routing traffic through their intelligent global network<\/strong> \u2013 a little like what Prolexic does for us <img data-recalc-dims=\"1\" decoding=\"async\" alt=\":)\" src=\"https:\/\/i0.wp.com\/blog.resellerclub.com\/wp-includes\/images\/smilies\/icon_smile.gif\" \/><\/p>\n<p>We already provide CloudFlare on our Hosting servers so Resellers can enable and start using it immediately. More information on how CloudFlare can protect you can be found here &#8211;\u00a0<a href=\"http:\/\/www.cloudflare.com\/overview\">http:\/\/www.cloudflare.com\/overview<\/a><\/p>\n<p><strong>How Web Hosting Providers should deal with a DDoS Attack:<\/strong><\/p>\n<p>DDoS attacks are a very real threat to website owners and hosts worldwide but like I said before, there is no foolproof way for anyone to really protect themselves against such an attack.<\/p>\n<p>As a Web Hosting provider yourself, I\u2019m sure you\u2019ve come across Customers that consider leaving you in the aftermath of a DDoS attack. You might have felt the same of your upstream provider as well. However, it\u2019s important to remember that anyone can be a target.<\/p>\n<p><strong><em>An indicator of a good Host isn\u2019t one that hasn\u2019t been attacked yet but one that can effectively restore services and reduce damage.<\/em><\/strong><\/p>\n<p>How Web Hosts handle the situation is also an important indicator. I\u2019ve always seen that the ones that do handle attacks effectively provide detailed information on the following: (This actually applies to most issues\/interruption in services)<\/p>\n<ol>\n<li>Which services were affected?<\/li>\n<li>Are the services back up or how long will it take to restore services?<\/li>\n<li>Does the Client need to do anything?<\/li>\n<li>Why did this happen i.e. details of the DDoS attack<\/li>\n<li>How was the attack mitigated?<\/li>\n<li>Can this happen again?<\/li>\n<li>Who can Clients contact if they have any concerns?<\/li>\n<\/ol>\n<p>Being honest and straightforward will go a long way in assuring your Customers that you\u2019re doing everything you can to resolve the issue and they\u2019ll respect you for keeping them in the loop.<\/p>\n<hr \/>\n<p>So there you have it \u2013 everything you need to know about DDoS Attacks and how you can deal with them! I\u2019d love to know what you think so do comment and let me know your thoughts.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet is abuzz with talks of the recent outage faced by Domain Registrar Godaddy. The outage was suspected to be because of a Distributed Denial of Service Attack (commonly known as a DDoS attack) that targeted Godaddy\u2019s DNS servers, affecting several websites as well as email services. (However, a recent statement by Godaddy mentions [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43],"tags":[],"class_list":["post-2587","post","type-post","status-publish","format-standard","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What are DDoS Attacks &amp; How to Deal with them - 365ezone Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are DDoS Attacks &amp; How to Deal with them - 365ezone Blog\" \/>\n<meta property=\"og:description\" content=\"The internet is abuzz with talks of the recent outage faced by Domain Registrar Godaddy. The outage was suspected to be because of a Distributed Denial of Service Attack (commonly known as a DDoS attack) that targeted Godaddy\u2019s DNS servers, affecting several websites as well as email services. (However, a recent statement by Godaddy mentions [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/\" \/>\n<meta property=\"og:site_name\" content=\"365ezone Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-01-06T18:44:48+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png\" \/>\n<meta name=\"author\" content=\"Sumit Pradhan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sumit Pradhan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/\",\"url\":\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/\",\"name\":\"What are DDoS Attacks & How to Deal with them - 365ezone Blog\",\"isPartOf\":{\"@id\":\"https:\/\/365ezone.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png\",\"datePublished\":\"2014-01-06T18:44:48+00:00\",\"dateModified\":\"2014-01-06T18:44:48+00:00\",\"author\":{\"@id\":\"https:\/\/365ezone.com\/blog\/#\/schema\/person\/0d5e59d73c776f5d00287dc4274b799f\"},\"breadcrumb\":{\"@id\":\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#primaryimage\",\"url\":\"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png\",\"contentUrl\":\"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/365ezone.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What are DDoS Attacks &#038; How to Deal with them\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/365ezone.com\/blog\/#website\",\"url\":\"https:\/\/365ezone.com\/blog\/\",\"name\":\"365ezone Blog\",\"description\":\"Best place to get Web Hosting information\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/365ezone.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/365ezone.com\/blog\/#\/schema\/person\/0d5e59d73c776f5d00287dc4274b799f\",\"name\":\"Sumit Pradhan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/365ezone.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/90558a964dc2d1f5a4c02bc3eeb872e3a5a0aff0a4b8a5b908094a59314a3167?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/90558a964dc2d1f5a4c02bc3eeb872e3a5a0aff0a4b8a5b908094a59314a3167?s=96&d=mm&r=g\",\"caption\":\"Sumit Pradhan\"},\"sameAs\":[\"https:\/\/365ezone.com\/\"],\"url\":\"https:\/\/365ezone.com\/blog\/author\/365ezoneadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are DDoS Attacks & How to Deal with them - 365ezone Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/","og_locale":"en_US","og_type":"article","og_title":"What are DDoS Attacks & How to Deal with them - 365ezone Blog","og_description":"The internet is abuzz with talks of the recent outage faced by Domain Registrar Godaddy. The outage was suspected to be because of a Distributed Denial of Service Attack (commonly known as a DDoS attack) that targeted Godaddy\u2019s DNS servers, affecting several websites as well as email services. (However, a recent statement by Godaddy mentions [&hellip;]","og_url":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/","og_site_name":"365ezone Blog","article_published_time":"2014-01-06T18:44:48+00:00","og_image":[{"url":"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png"}],"author":"Sumit Pradhan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sumit Pradhan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/","url":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/","name":"What are DDoS Attacks & How to Deal with them - 365ezone Blog","isPartOf":{"@id":"https:\/\/365ezone.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#primaryimage"},"image":{"@id":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#primaryimage"},"thumbnailUrl":"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png","datePublished":"2014-01-06T18:44:48+00:00","dateModified":"2014-01-06T18:44:48+00:00","author":{"@id":"https:\/\/365ezone.com\/blog\/#\/schema\/person\/0d5e59d73c776f5d00287dc4274b799f"},"breadcrumb":{"@id":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#primaryimage","url":"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png","contentUrl":"http:\/\/blog.resellerclub.com\/wp-content\/uploads\/2012\/09\/ddosattack1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/365ezone.com\/blog\/what-are-ddos-attacks-how-to-deal-with-them\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/365ezone.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What are DDoS Attacks &#038; How to Deal with them"}]},{"@type":"WebSite","@id":"https:\/\/365ezone.com\/blog\/#website","url":"https:\/\/365ezone.com\/blog\/","name":"365ezone Blog","description":"Best place to get Web Hosting information","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/365ezone.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/365ezone.com\/blog\/#\/schema\/person\/0d5e59d73c776f5d00287dc4274b799f","name":"Sumit Pradhan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/365ezone.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/90558a964dc2d1f5a4c02bc3eeb872e3a5a0aff0a4b8a5b908094a59314a3167?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/90558a964dc2d1f5a4c02bc3eeb872e3a5a0aff0a4b8a5b908094a59314a3167?s=96&d=mm&r=g","caption":"Sumit Pradhan"},"sameAs":["https:\/\/365ezone.com\/"],"url":"https:\/\/365ezone.com\/blog\/author\/365ezoneadmin\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/posts\/2587","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/comments?post=2587"}],"version-history":[{"count":0,"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/posts\/2587\/revisions"}],"wp:attachment":[{"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/media?parent=2587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/categories?post=2587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/365ezone.com\/blog\/wp-json\/wp\/v2\/tags?post=2587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}