Improve company productivity with a Business Account.Sign Up

x
?
Solved

Denial of service attacks

Posted on 2004-09-09
4
Medium Priority
?
494 Views
Last Modified: 2010-04-11
How can I defend a denial of service attack on my network ?
0
Comment
Question by:drtoto82
2 Comments
 
LVL 4

Accepted Solution

by:
Kaarthick earned 200 total points
ID: 12016635
Please visit this site http://www.dshield.org/ and click on the link named

" Are you cracked? Click here to see "

It will give you the ports which are currently used by the Trojans in  your system. You can deny the outbound and inbound connections to those ports using the firewall you've setup.
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 12019642
Keeping a low profile is one way, don't advertise unneccesarily in DNS, set your firewall to reject ICMP packets, use uncommon ports for private services (i.e. webmail, popmail, ftp, etc not intended for the general public). Obfuscate your operating systems and application servers - i.e. set your IIS server to report something like "acme web server v1.0 beta" via URLscan so that bots looking to compromise an IIS installation will leave you alone. Use of a high-end firewall that can detect DOS attacks through stateful inspection can help. Use of a tar pit can slow down DOS attacks.

http://labrea.sourceforge.net/labrea-info.html
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

It's not just another paperwork submission. Serious planning and rigour to managing the whole thought processes need to be put in place. The intent is not on drilling into the details, but to share tips in getting the first thing right to kick-start…
The onset of year 2018 has been a usual business for IT teams still struggling to find their way out in terms of strengthening their cloud security.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

585 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question