Research Article | Open Access | Download PDF
Volume 27 | Number 1 | Year 2015 | Article Id. IJCTT-V27P111 | DOI : https://doi.org/10.14445/22312803/IJCTT-V27P111
DDoS Deflate and APF (Advanced Policy Firewall):A Report
Dr.S.Brilly Sangeetha
Citation :
Dr.S.Brilly Sangeetha, "DDoS Deflate and APF (Advanced Policy Firewall):A Report," International Journal of Computer Trends and Technology (IJCTT), vol. 27, no. 1, pp. 64-69, 2015. Crossref, https://doi.org/10.14445/22312803/IJCTT-V27P111
Abstract
The article helps to find solutions to totally slow network, websites loading was 10-20sec, slow loading, server load is very high and there are many clients who is doing problems. After connection made to the server and checking statistics - server CPU will remain all the time on 20-30%, memory was fine, all services were up-and-running so where it went wrong? There was so many connections from some IPs that was like wow...after blocking them, server statistics is back to normal again (probably some kind of DDOS attack) At this point, since Plesk donot have something like CSF on cPanel, being able to understand that the system need something to block this "Fake" IPs or at least the ones with a lot of connections automatically, without my concern doing it manually. Hence this paper helps inproviding the knowledge installing successfully (DDOS Deflate and APF (Advanced Policy Firewall).
Keywords
APF (Advanced Policy Firewall), statistics, DDoS-Distributed Denial of service.
References
[1] Patrikakis, C., Masikos, M., & Zouraraki, O. (2004). Distributed denial of service attacks. Internet Protocol Journal,7(4),Retrievedfromhttp://www.cisco.com/web/about/ ac123/ac147/archived_issues/ipj_74/dos_ attacks.html Rashid, F. (2011). Ddos attack knocks out hong kong stock exchange news website. eWeek, Retrieved from http://www.eweek.com/c/a/Security/DDoS-Attack Knocks-Out-Hong-Kong-Stock-Exchange-News-Web-Site- 389466/
[2] Rashid, F. (2011). Sony data breach was camouflaged by anonymous ddos attack. eWeek, Retrieved from http://www.eweek.com/c/a/Security/Sony-Data-Breach-Was- Camouflaged-by-Anonymous-DDoS-Attack- 807651/
[3] Subramani, R. (2011). Denial of service attacks and mitigation techniques: real time implementation withdetailed analysis. Retrieved from http://www.sans.org/reading_room/whitepapers/detection/de nial-serviceattacks-mitigation-techniques-real-timeimplementation- detailed-analysi_3376
[4] Verisign. (2012). Products and services - network intelligence and availability. Retrieved fromhttp://www.verisigninc.com/en_US/products-andservices/ network-intelligence-availability/index.xhtml
[5] Walfish, M. (2006). DdoS defense by offense. Retrieved from http://nms.lcs.mit.edu/papers/ddos offensesigcomm06.pdf
[6] Zheng, Y. (2011). Distributed denial of service attack principles and defense mechanisms. Advances in Natural Science, 4(2)