当前位置:网站首页>Compare the effects of several CC protection methods, which one do you use?

Compare the effects of several CC protection methods, which one do you use?

2020-12-08 14:34:29 osc_ ninety-one million one hundred and seventy-seven thousand

 

If you understand CC Principle attacks , It's not hard to target Sexual Implement some effective CC protective measures .CC The attack technology content of attack is low , Use tools and some IP agent , A beginning 、 Intermediate computer level users can carry out attacks .

 

Usually prevent CC There are several ways to attack , One is through the firewall , Other network companies also provide some firewall services , for example XX Website guard and XX treasure , Another way is to write your own program to prevent , Try all kinds of CC protective Fang type The effectiveness of the .

 

 Compare several CC The effect of the way of protection , Which one do you use ?

 

The first one is   Use a firewall

 

In principle , Basically all firewalls detect concurrency TCP/IP Number of connections , Beyond a certain number, a certain frequency is considered to be Connection-Flood. But if IP The number is big enough , To make a single IP The number of connections is less , Then the firewall may not be able to stop CC attack .

 

The second kind   Use the WebGuard

 

Use the so and so website guard to prevent attacks , From the interface , It seems to have prevented a lot of CC attack , But after logging into the website, I found , The traffic is still abnormal , The attack is still the same , It looks like this website guard's CC protective The effect did not reach .

 

The third kind of   By analyzing the website log , Shield the attacker IP

 

actually , By analyzing the website log , It's still easy to tell which IP yes CC The attack , because CC After all, the attack is to grab the web page through the program , And the characteristics of ordinary visitors are very different . For example, ordinary visitors visit a web page , It's bound to continue to grab pages HTML file 、CSS file 、JS A series of related documents, such as documents and pictures ; and CC The attacker will only grab one URL Address file , It doesn't grab other types of files .

 

Its User Agent Most of them are different from ordinary visitors , This makes it easy to tell which visitors are CC attacked , Since we can judge the attacker's IP, So the precautions are simple , Just batch these IP shielding , You can achieve CC protective Purpose .

 

A fourth   Write your own small program

 

And you can do it yourself flowers Time I wrote a little program , After running, it automatically blocks hundreds of IP, Websites are normal , To show , Firewall for CC Defense against attacks is not effective , The most effective method is still in the server side through the program automatic shielding to prevent .

 

 Compare several CC The effect of the way of protection , Which one do you use ?

 

Websites can be filtered by program , Easy access to these attackers IP, Block in batches , that Can achieve CC protective . Because though CC The threshold of attack very low , The effect is obvious , A few hundred agents or broilers can attack people , If the attacker has a lot of traffic , Attacks can be carried out by consuming bandwidth resources . however ,CC Attacks also have obvious technical flaws , It's the attacker's IP It's not massive , It's usually hundreds of thousands of levels , And actually visited the website page .

 

This article is from :https://www.zhuanqq.com/News/Industry/271.html

版权声明
本文为[osc_ ninety-one million one hundred and seventy-seven thousand ]所创,转载请带上原文链接,感谢
https://chowdera.com/2020/12/202012081433467008.html