Film-Tech Cinema Systems
Film-Tech Forum ARCHIVE


  
my profile | my password | search | faq & rules | forum home
  next oldest topic   next newest topic
» Film-Tech Forum ARCHIVE   » Community   » Film-Yak   » What are DDoS Attacks and how to Stop/Prevent Them?

   
Author Topic: What are DDoS Attacks and how to Stop/Prevent Them?
Joe Redifer
You need a beating today

Posts: 12859
From: Denver, Colorado
Registered: May 99


 - posted 12-26-2004 05:20 PM      Profile for Joe Redifer   Author's Homepage   Email Joe Redifer   Send New Private Message       Edit/Delete Post 
Another web site that I moderate is currently under "DDoS Attacks". WTF are DDoS attacks? All I can surmise from the person who runs the site is that there are many, many HTTP requests for that domain coming from many different "fake" IP addresses, which has caused the site to be suspended for the time being. He is afraid that he will get charged for the attacks. Would any reputable hosting company do that?

Also, is there a way to stop or prevent these type of lame-ass attacks?

 |  IP: Logged

David Stambaugh
Film God

Posts: 4021
From: Eugene, Oregon
Registered: Jan 2002


 - posted 12-26-2004 07:37 PM      Profile for David Stambaugh   Author's Homepage   Email David Stambaugh   Send New Private Message       Edit/Delete Post 
Lots of good info here and here.

 |  IP: Logged

Bobby Henderson
"Ask me about Trajan."

Posts: 10973
From: Lawton, OK, USA
Registered: Apr 2001


 - posted 12-27-2004 12:26 AM      Profile for Bobby Henderson   Email Bobby Henderson   Send New Private Message       Edit/Delete Post 
quote: Joe Redifer
Also, is there a way to stop or prevent these type of lame-ass attacks?
Not really. At least not with the way large ISPs currently do business. The link to the GRC.com's DOS attack story page illustrates this fact very specifically. They don't care about customer problems or the bad conduct of other users.

The amount denial of service attacks would be greatly reduced if large ISPs would automatically detect and delete any malware infected e-mail arriving on their mail servers. Most computers are infected and turned into "bots" via e-mail (typically downloaded via Outlook Express in its dangerously unsecure default configuration). This is by far the most effective and effortless method to use in infecting computers and building up an army of bots. If the ISPs would just kindly pull their heads out of their backsides on this issue, you would see a great deal of the problem disappear in a very short amount of time. This step would not eliminate the problem completely (you still have usenet, chat and P2P postings of malware). Hackers would have to build bot armies in a much slower fashion.

 |  IP: Logged

David Buckley
Jedi Master Film Handler

Posts: 525
From: Oxford, N. Canterbury, New Zealand
Registered: Aug 2004


 - posted 12-27-2004 05:11 AM      Profile for David Buckley   Author's Homepage   Email David Buckley   Send New Private Message       Edit/Delete Post 
Perhaps not in the best taste, but the spam that delivers the malbots (amongst much other cr*p) has reduced in volume dramatically coincidentally since a certain natural phenomena affecting much of the pacific rim occured...

As an observation, tonight on tele here in New Zealand we had the episode of Watching Ellie featuring an earthquake, and the movie The Beach. I cant help but think that when I lived in the UK both of these would have been canned and replaced with items less related to curent news.

 |  IP: Logged

Mark J. Marshall
Film God

Posts: 3188
From: New Castle, DE, USA
Registered: Aug 2002


 - posted 12-27-2004 09:06 AM      Profile for Mark J. Marshall     Send New Private Message       Edit/Delete Post 
A friend of mine is a Novell engineer. He said that the FBI came to Novell once and asked them why Border Manager (their firewall software) was issuing DOS attacks against ISPs. Novell had no answer of course. They did some investigative work and they discovered that the customers who were supposedly issuing the attacks against the ISPs via Border Manager had Border Manager's reverse proxy services turned on. Reverse proxy caches a web server's content and then hands out the responses to the HTTP requests coming in so the surfing PCs never actually touch the web server itself. As it turns out, there was a DOS attack going on against company with the Border Manager proxy server, but Border Manager's proxy server is so fast, it was actually able to keep up just fine, and the result was that it looked like there was an attack against the attacker's ISP.

 |  IP: Logged



All times are Central (GMT -6:00)  
   Close Topic    Move Topic    Delete Topic    next oldest topic   next newest topic
 - Printer-friendly view of this topic
Hop To:



Powered by Infopop Corporation
UBB.classicTM 6.3.1.2

The Film-Tech Forums are designed for various members related to the cinema industry to express their opinions, viewpoints and testimonials on various products, services and events based upon speculation, personal knowledge and factual information through use, therefore all views represented here allow no liability upon the publishers of this web site and the owners of said views assume no liability for any ill will resulting from these postings. The posts made here are for educational as well as entertainment purposes and as such anyone viewing this portion of the website must accept these views as statements of the author of that opinion and agrees to release the authors from any and all liability.

© 1999-2020 Film-Tech Cinema Systems, LLC. All rights reserved.