CC attack: \

With the rapid development and popularization of network technology, the network has changed everyone’s way of life and work, and the network security problem is becoming more and more serious. In recent years, the frequency of network intrusion is increasing, and the harm is becoming more and more serious. Distributed denial of Service attack (DDoS) is the most serious one. DDoS attack can make the attacked network host completely lose normal service ability in a short time.

ChallengeCoHapsar (ChallengeCoHapsar) attacks are a common type of DDoS attacks. An attacker controls certain hosts to send a large number of data packets to the opponent server, depleting server resources until the system breaks down and crashes. CC attacks are mainly aimed at WEB servers that send a large number of concurrent requests, focusing on resource-consuming functions in applications, occupying a large number of system resources. The technical content and cost of CC attacks are very low. As long as there are hundreds of IP addresses and several processes for each IP address, there can be thousands of concurrent requests. It is easy to exhaust the resources of the target server and cause the website to go down.

Ii. Common ways of CC attack:

CC attack There are three common attack modes: single-host virtual multi-IP address attack, proxy server attack, and botnet attack.

Single-host virtual multi-IP address attack: An attacker uses a host to create multiple fictitious IP addresses to send a large number of requests to the specified page of the target server. If the server does not have time to process these requests, the page cannot respond and normal access is denied.

Proxy server attack: The attacker sends access requests to the proxy server by attacking the host. Then the attack host can immediately disconnect from the proxy server, and immediately send the next access request, because the proxy server will receive access to the application server’s specified page resources. Therefore, the attacking host does not have to maintain access to the connection as it does directly to the application server, so using this method of attack will be much more efficient.

Botnet attack: An attacker sends a large number of requests to the server through a botnet. The victim host receives the requests from a large number of scattered IP addresses without any IP address information of the attacker. This attack method highly simulates the normal access process of many users to the application server, so it is highly hidden.

Iii. CC attack defense methods:

CC attacks can simulate normal users and use real IP addresses to access, so they are highly hidden. Common effective defense methods for CC attacks are as follows:

1. Select a reliable high-defense server to improve server hardware and network bandwidth resources: High-performance server hardware capabilities and sufficient network bandwidth resources can improve the bearing capacity of the system against CC attacks

2. Website page static: website page static can greatly reduce the consumption of system resources, so as to improve the anti-system anti-attack ability;

3.IP mask restriction: identify the source IP address of the attacker. For the source IP address of CC attacks, you can set the MASK on the IP address in IIS to limit its access, so as to prevent IIS attacks.

4. Deploy a high-defense CDN: Access a high-defense CDN, hide the source IP address of the server, automatically identify attack traffic, and return normal visitor traffic to the IP address of the source server after cleaning, ensuring service security.

5. Enable CC defense on the server.

Birdie cloud server background can open CC defense function, escort your site.