• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

DDoS Attacks: Use Cloud-Based Protection and Apache Module

Ryan Kh / 3 min read.
October 12, 2016
Datafloq AI Score
×

Datafloq AI Score: 84

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/no75N

Any self-respecting webmaster or site administrator should be familiar with the different security techniques to mitigate potential Distributed Denial of Service (DDoS) attacks a security threat that utilizes a network of compromised systems to flood a web server with traffic and deny access to legitimate users. With the high costs and opportunity losses associated with downtime, administrators need to step up and explore every option to protect the integrity of the website infrastructure.

Protecting against DDoS basically involves three methodologies, which range from free to costly, and which are applicable to web deployments of different sizes.

Mod_evasive: a DIY approach

The most basic line of defense against DDoS is the do-it-yourself approach, which involves an Apache web server module called mod_evasive. Formerly known as mod_dosevasive, the mod_evasive module is built into Apache and is designed to stop traffic-based attacks by setting thresholds and IP blacklisting. Mod_evasive monitors traffic using a dynamic hash table and denies access to IP addresses with suspicious activity.

Given that it is already included in Apache, its a popular choice for small web deployments that dont expect much traffic. However, it does require some tweaking and setting up, in order to be effective against basic attacks. Using mod_evasive requires you to modify your server configuration files, which means it can be a time-consuming activity for webmasters.

By default, the module blocks an IP for 10 seconds if it sends 2 or more page requests in a single second. You may adjust these limits as you see fit.

After blocking a potential attack, mod_evasive keeps syslog reports so you can monitor and tweak how it performs. You can also enable mod_evasive to send automated notifications thru email, so you are always updated.

This approach is quite rudimentary and limited, though. Such DIY solutions are deployed mostly as a reactive measure after a website suffers its first DDoS incident. Remember that attackers are usually one step ahead of you, however. Many will deploy their attacks through distributed infrastructure and harder-to-detect approaches, which can severely limit the effectiveness of mod_evasive.

Hardware Appliances

Web administrators who expect regular traffic surges and spikes can deploy onsite equipment to better mitigate the effects of an all-out DDoS attack. These devices have traffic-filtering and analytics capabilities and use several means of detecting and blocking malicious traffic.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

The biggest limitation to hardware appliance, however, is cost. It is therefore not a viable option for businesses that prefer not to spend too much on capital and infrastructure expenditure. In addition, deploying hardware DDoS protection can be limited in terms of scalability, as it is still dependent on the networks uplink capacity.

In addition, each on-premise device can only protect the website infrastructure within its physical location. If you have a distributed infrastructure, you will need to deploy an appliance in all of these data centers. Also, hardware-based DDoS mitigation will usually require manual deployment, significantly lengthening the time it takes before you can successfully fight back against an attack.

In many cases, the use of on-premises appliances is done in combination with an off-premise or cloud-based solution to ensure better scalability and faster time-to-mitigation.

Cloud-Based DDoS Protection

This type of DDoS protection is usually offered as a managed service by either your internet service provider or a dedicated DDoS mitigation service. This includes both application-layer and network-layer protection, which provide additional protection options on top of a server-based and appliance-based approach.

In addition, cloud-based DDoS protection offers unlimited scalabilityyou can start small, although it will still protect your infrastructure even as the demand grows. Off-premise protection also has the advantage of faster time-to-mitigation, since it can be deployed either on-demand or as an always-on service.

Another advantage of cloud-based DDoS protection is the reduced capital and human resource expenditure. Being a managed service, you no longer need to invest in on-premise infrastructure or the staff to maintain and support it.


Conclusion

It is best to consider your needs and budget, especially if you are looking into invest in hardware-based DDoS mitigation. Remember that it is always better to prevent security breaches proactively than to deal with the damages later. In the event of a DDoS attack, it may already be too late, once your server infrastructure is no longer able to react due to the massive network traffic and requests it is handling. These safeguards may involve a bit of time, effort and money, but ensuring service uptime for your customers and users will be worth it.

Categories: Cybersecurity
Tags: Apache, cloud computing, hackers, hardware, security

About Ryan Kh

Ryan Kh is a big data and analytics expert, marketing digital products on Amazon's Envato. Follow Ryan's daily posts on https://catalystforbusiness.com/

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer engineering environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics application Artificial Intelligence BI Big Data business China Cloud Companies company crypto customers Data design development digital engineer engineering environment experience future Google+ government Group health information learning machine learning mobile news public research security services share skills social social media software solutions strategy technology

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

settings

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!