?
Solved

HTTP Flood Denial of Service

Posted on 2007-12-03
3
Medium Priority
?
1,803 Views
Last Modified: 2013-11-16
I'm on Red Hat Linux 5 using the Apache web server.

What are people recommending for protecting against  HTTP flood attacks?

I'd love to have some application that could limit usage by IP address - like allowing only one page load per unique IP address every two seconds.

Does something like this exist?

http://pear.php.net/package/HTTP_FloodControl
0
Comment
Question by:Geoff Millikan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Accepted Solution

by:
simonbun earned 2000 total points
ID: 20463775
Yes, you should look into apache's mod_security (http://www.modsecurity.org/) or mod_evasive (http://www.zdziarski.com/projects/mod_evasive/). Both can do this, but in my experience it was easier to do this with mod_evasive.

regards,
Simon
0
 

Author Comment

by:Geoff Millikan
ID: 20467244
Simon,

Thanks! And I'm sorry, I should have indicated that I'm on Apache/2.2.3.  Looks like mod_evasive doesn't run on 2.2.x  So would you suggest my best option is http://www.modsecurity.org/ 
0
 
LVL 1

Expert Comment

by:simonbun
ID: 20470157
Yes, mod_security has a whole slew of configuration options, allowing very specific settings. Limiting requests by ip / s is possible.
0

Featured Post

Plug and play, no additional software required!

The ATEN UE3310 USB3.1 Gen1 Extender Cable allows users to extend the distance between the computer and USB devices up to 10 m (33 ft). The UE3310 is a high-quality, cost-effective solution for professional environments such as hospitals, factories and business facilities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
If your site has a few sections that need to be secure when data is transmitted between the server and local computer, such as a /order/ section for ordering or /customer/ which contains customer data, etc it would of course be recommended to secure…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question