DDoS Deflate and APF (Advanced Policy Firewall):A Report

International Journal of Computer Trends and Technology (IJCTT)          
© 2015 by IJCTT Journal
Volume-27 Number-2
Year of Publication : 2015
Authors : Dr.S.Brilly Sangeetha
DOI :  10.14445/22312803/IJCTT-V27P111


Dr.S.Brilly Sangeetha "DDoS Deflate and APF (Advanced Policy Firewall):A Report". International Journal of Computer Trends and Technology (IJCTT) V27(2):64-69, September 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The article helps to find solutions to totally slow network, websites loading was 10-20sec, slow loading, server load is very high and there are many clients who is doing problems. After connection made to the server and checking statistics - server CPU will remain all the time on 20-30%, memory was fine, all services were up-and-running so where it went wrong? There was so many connections from some IPs that was like wow...after blocking them, server statistics is back to normal again (probably some kind of DDOS attack) At this point, since Plesk donot have something like CSF on cPanel, being able to understand that the system need something to block this "Fake" IPs or at least the ones with a lot of connections automatically, without my concern doing it manually. Hence this paper helps inproviding the knowledge installing successfully (DDOS Deflate and APF (Advanced Policy Firewall).

[1] Patrikakis, C., Masikos, M., & Zouraraki, O. (2004). Distributed denial of service attacks. Internet Protocol Journal,7(4),Retrievedfromhttp://www.cisco.com/web/about/ ac123/ac147/archived_issues/ipj_74/dos_ attacks.html Rashid, F. (2011). Ddos attack knocks out hong kong stock exchange news website. eWeek, Retrieved from http://www.eweek.com/c/a/Security/DDoS-Attack Knocks-Out-Hong-Kong-Stock-Exchange-News-Web-Site- 389466/
[2] Rashid, F. (2011). Sony data breach was camouflaged by anonymous ddos attack. eWeek, Retrieved from http://www.eweek.com/c/a/Security/Sony-Data-Breach-Was- Camouflaged-by-Anonymous-DDoS-Attack- 807651/
[3] Subramani, R. (2011). Denial of service attacks and mitigation techniques: real time implementation withdetailed analysis. Retrieved from http://www.sans.org/reading_room/whitepapers/detection/de nial-serviceattacks-mitigation-techniques-real-timeimplementation- detailed-analysi_3376
[4] Verisign. (2012). Products and services - network intelligence and availability. Retrieved fromhttp://www.verisigninc.com/en_US/products-andservices/ network-intelligence-availability/index.xhtml
[5] Walfish, M. (2006). DdoS defense by offense. Retrieved from http://nms.lcs.mit.edu/papers/ddos offensesigcomm06.pdf
[6] Zheng, Y. (2011). Distributed denial of service attack principles and defense mechanisms. Advances in Natural Science, 4(2)

APF (Advanced Policy Firewall), statistics, DDoS-Distributed Denial of service.