Solved

DDoS Protection services

Posted on 2014-04-07
4
340 Views
Last Modified: 2014-04-09
Hi,

We have suffered a couple of serious Syn Flood attacks recently.  We thought we had put the right levels of protection on our server, but we are now seriously considering using a web based service (see list below).

What should we look out for with these services?

What should we expect to pay for the services?

Does anyone have any particular recommendations?

cloudflare.com
dosarrest.com
rivalhost.com
prolexic.com
incapsula.com

Many thanks
chris
0
Comment
Question by:Chris_Ryan
4 Comments
 
LVL 25

Expert Comment

by:Tony Giangreco
ID: 39983166
hardware based firewall, it is probably being logged. I suggest reviewing those logs. I also suggest having those logs sent to a system admin by email as the log fills up so they can be reviewed anytime. Without sending those logs, the old logged events get  over written as new logs are created.

We use a Sonicwall firewall for this. It works very well. Cisco and other brands should work well also.

You might also try contacting your ISP, although most of the time, adding a firewall is the best first step.

Hope this helps.
0
 
LVL 25

Expert Comment

by:Diverse IT
ID: 39983728
How many users are in you protecting? What do you have in place currently?
0
 

Author Comment

by:Chris_Ryan
ID: 39983878
Hi Diverseit

We have six major domains and hundreds of sub-domains.

We have CSF in place with iptables

Thanks
Chris
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 500 total points
ID: 39987157
You have to work with the ISP's to mitigate some of these large DDOS attacks, you can't do it yourself with hardware. If the pipe fills up, your RST packet's can't get through, and if they are redirected+amplified, you may cause harm to other networks. CloudFlare and others work with the ISP's, they don't have any magic other than that:
http://blog.cloudflare.com/the-ddos-that-knocked-spamhaus-offline-and-ho
You can't mitigate todays attacks of this magnitude without a special service, hardware doesn't cut it anymore.
-rich
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question