TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks

40 pointsby rohitarondekarover 14 years ago

4 comments

spydumover 14 years ago
That document is terribly dated, and describes nothing resembling modern day DDoS protection.<p>Nowadays, it's all about routing the target host through a series of high bandwidth/high processing filters to identify and drop the bad traffic. People don't use SMURF (haven't in over 5 years), and most floods are not ICMP anymore, they are mindless HTTP requests from seemingly "valid" looking zombie clients.
pilomover 14 years ago
All of those defenses assume that the attacker is a bunch of zombies sending ICMP or SYN messages or with spoofed IP addresses. When Anon attacks its with volunteered HTTP traffic so these defenses don't work.
kersnyover 14 years ago
1. Don't piss Anon off.
roadnottakenover 14 years ago
I thought zombies were usually compromized Windows boxes. This article says they're mostly linux. If that's the case, why so many friggin' Windows viruses?
评论 #1987881 未加载
评论 #1987896 未加载