Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

10 Strategies To Fight Anonymous DDoS Attacks

Preventing distributed denial of service attacks may be impossible. But with advance planning, they can be mitigated and stopped. Learn where to begin.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
Consider 2011 to be the year that distributed denial-of-service (DDoS) attacks went mainstream.

Who's responsible? Blame Anonymous, according to a new report released Monday by security vendor Radware.

"Their major campaign, Operation Payback, during the WikiLeaks saga in December 2010--against those supporting the U.S. government--was the turning point that shaped the security scene in 2011," according to the report. In short, by distributing easy-to-use DDoS tools, such as low-orbit ion cannon, Anonymous popularized DDoS attacks.

[ So you've been hacked. Learn 9 Ways To Minimize Data Breach Fallout. ]

But are DDoS attacks something that businesses and government agencies must simply endure, or, can they be more actively resisted? In fact, organizations can take a number of steps to at least mitigate the effect that DDoS attacks have on their websites, servers, databases, and other essential infrastructure.

1. Know you're vulnerable.
One lesson from the use of DDoS by Anonymous--as well as its sister hacktivist group LulzSec--is that any site is at risk. That's not meant to sound alarmist, but rather simply to acknowledge that the hacktivist agenda can seem random, at best. Indeed, after Anonymous came along, "the financial sector, which had not really considered itself as a prime target, was hit and urgently forced to confront threatening situations," according to the Radware report. "Government sites had been targeted before, but 2011 saw a dramatic increase in frequency, and neutral governments that felt themselves exempt, like New Zealand, were attacked."

2. DDoS attacks are cheap to launch, tough to stop.
As the recent Anonymous retaliation for the Megaupload takedown shows, hacktivists can quickly crowdsource "5,600 DDoS zealots blasting at once," as Anonymous boasted on Twitter, to take down the websites of everyone from the FBI and the Justice Department to the Motion Picture Association of America and Recording Industry Association of America. "DDoS is to the Internet what the billy club is to gang warfare: simple, cheap, unsophisticated, and effective," said Rob Rachwald, director of security strategy of Imperva, via email.

3. Plan ahead.
Stopping DDoS attacks requires preparation. If attacked, "folks that don't take active measures to ensure the resilience of their networks are going to get knocked over," said Roland Dobbins, Asia-Pacific solutions architect for Arbor Networks, via phone. "They need to do everything they can to increase resiliency and availability." Accordingly, he recommends implementing "all of the industry best and current practices for their network infrastructure, as well as applications, critical supporting services, including DNS."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
AlanWade8
50%
50%
AlanWade8,
User Rank: Apprentice
5/26/2016 | 10:10:09 AM
re: 10 Strategies To Fight Anonymous DDoS Attacks
Thats why VPN is need to use by everybody. I read an interesting blog https://www.purevpn.com/blog/ddos-attack-protection/ through we can save our self by DDoS through a VPN
DrRo
50%
50%
DrRo,
User Rank: Apprentice
3/16/2015 | 12:18:46 PM
Re: No real information
I would like to point out that YOU came to THIS article 2 YEARS after it was posted. In the IT field, it's pretty much Rule-of-Thumb that unless it was posted today it most likely isn't relevant. The fault here isn't as much with the author as it is with you. Yes he provided some AMAZINGLY useless information. I mean seriously he named this article "10 Strategies to fight Anonymous DDoS Attacks" and then rode Anonymous's d*** for the entire thing and gave us no actualy strategy to actually fight these attacks. Considering all of that, I still think your comment was stupid and needless since you completely ignored the date it was published.

Let's hope you put more thought into your work than you do your commenting.
socratessaysno
50%
50%
socratessaysno,
User Rank: Apprentice
12/13/2014 | 2:20:24 AM
No real information
From what I've seen, the article did absolutely NOTHING on actually providing any worthwhile or relevent information beyond failing horribly at trying to sound helpful.


After reading the comments, this website should fire the author of this article and fill it in with the comments. Going to try a few of them out on myself and see which ones I like best. The commenters were more helpful than this garbage article. I didn't realize we needed to be told how to use common sense.
Ogara7
50%
50%
Ogara7,
User Rank: Apprentice
2/2/2014 | 4:13:13 AM
re: 10 Strategies To Fight Anonymous DDoS Attacks
My friend got a guy to dodos my minecraft server too... I managed to talk to him nd calm the situation down but I'm still concerned. My PC is 4 years old! It will never survive!
KyleT412
50%
50%
KyleT412,
User Rank: Apprentice
7/21/2013 | 5:44:20 AM
re: 10 Strategies To Fight Anonymous DDoS Attacks
I need a trick FAST. Apparently Anon is going to DdoS me on Monday D:. I own a minecraft server and they came on and fucked it up so i DdoSed him for 5mins. He said they will DdoS me and fry my router OR I have to pay them $800. And im 14 soooo ya.
seoarcher
50%
50%
seoarcher,
User Rank: Apprentice
1/26/2013 | 4:18:43 AM
re: 10 Strategies To Fight Anonymous DDoS Attacks
I also forgot to mention it is running php on a windows machine co .htaccess blocking will not work. I post some info here also http://www.seoarcher.com .
seoarcher
50%
50%
seoarcher,
User Rank: Apprentice
1/26/2013 | 4:14:59 AM
re: 10 Strategies To Fight Anonymous DDoS Attacks
My http://www.seoarcher.com website is suffering badly by a DoS attack. The user is changing ips daily so its hard to stop. Any help . pleasee...
jeandebogue
50%
50%
jeandebogue,
User Rank: Apprentice
11/28/2012 | 6:04:55 PM
re: 10 Strategies To Fight Anonymous DDoS Attacks
It's because there is a trick to block the traffic before it reaches you. In fact there are more than just 1 trick.

If you are curious let me know and I'll let you know what it is.
Juffe
50%
50%
Juffe,
User Rank: Apprentice
10/3/2012 | 9:46:46 AM
re: 10 Strategies To Fight Anonymous DDoS Attacks
You should also keep a close eye on the security logs for unknown username / password login attempts since they also consume CPU / RAM to manage.. When it comes to Windows servers I personally recommend having a look at Syspeace ( http://www.syspeace.com ) and for Linux fail2ban. Also consider redirecting 404 and 403 errors on webservers to somewhere else, to Google or 127.0.0.1 or something ..
davesg
50%
50%
davesg,
User Rank: Apprentice
2/8/2012 | 7:38:55 PM
re: 10 Strategies To Fight Anonymous DDoS Attacks
IMO most of this is fluff. If the bandwidth of a targetted DOS attack is larger than the pipe it is unstoppable. Really one of the things you mentioned, being friends with your upstream, and your upstreams pipe being bigger than the DOS attacks capacity is the only thing that will help you.
Page 1 / 2   >   >>
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1874
PUBLISHED: 2019-06-20
A vulnerability in the web-based management interface of Cisco Prime Service Catalog Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protection mechanisms on the web-ba...
CVE-2019-1875
PUBLISHED: 2019-06-20
A vulnerability in the web-based management interface of Cisco Prime Service Catalog could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient validation of user-supplied input by t...
CVE-2019-1876
PUBLISHED: 2019-06-20
A vulnerability in the HTTPS proxy feature of Cisco Wide Area Application Services (WAAS) Software could allow an unauthenticated, remote attacker to use the Central Manager as an HTTPS proxy. The vulnerability is due to insufficient authentication of proxy connection requests. An attacker could exp...
CVE-2019-1878
PUBLISHED: 2019-06-20
A vulnerability in the Cisco Discovery Protocol (CDP) implementation for the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, adjacent attacker to inject arbitrary shell commands that are executed by the device. The vulnerability is due to insuff...
CVE-2019-1879
PUBLISHED: 2019-06-20
A vulnerability in the CLI of Cisco Integrated Management Controller (IMC) could allow an authenticated, local attacker to inject arbitrary commands that are executed with root privileges. The vulnerability is due to insufficient validation of user-supplied input at the CLI. An attacker could exploi...