Here’s How to Stop a DDoS Attack in Progress

Here’s How to Stop a DDoS Attack in Progress

Whether you know what a DDoS attack is and want to find out how to stop one already in progress, or you want to find out precisely what it is and how it works, then you’re at the right place!

In this article, we cover the basic questions around a DDoS attack and share the easiest and fastest way to deal with them. Read on below if you want to arm yourself with the knowledge to protect your websites from a DDoS attack.

 – What Are They?

DDoS is short for the distributed denial-of-service, which in layman terms means that it’s an attack aiming to prevent access to online services. This attack is executed by overwhelming a website with so much traffic that it becomes unavailable to its users. Large companies are at the highest risk for a DDoS attack; however, small companies have become a popular target over the last year.

How Common Are ?

 are relatively common. They’re responsible for 33% of all website downtime incidents, with over 2,000 being observed globally every day. Purchasing a week’s worth of  can  as little as $150 on the black market, allowing affordable access to those who want to do one.

How Are  Carried Out?

Before attackers launch their attack, they send botnets out to form a shadow army on the target device. These botnets are sent to the target device through social media, emails, and websites. Attackers need to build botnet networks infecting the target device with software that allows them to remotely control the device without the owners’ knowledge.

Once an attacker launches the attack, the botnets generate a massive traffic load to saturate their target. Overwhelming a target uses more of their bandwidth, leading to multiple errors or unavailability. Large  are powerful enough to shut down a country’s global cable magnitude!

How Do You Terminate a DDoS Attack?

Knowing how to halt a DDoS attack already in progress can prevent significant damage from being done. If your online property is under an attack, or you believe it’s under the target, do the following:

  1. Add the BestKnownHost Website Security Deluxe plan
  2. Do the 1-click activation task.
  3. Enable the emergency DDoS protection option.
  4. Additionally, you can also block site visitors, obstruct direct access to your server and run an unlinked email service.

Below we give a detailed overview of each step.

Adding BestKnownHost Website Security

Experience: Beginner

Time: 2 minutes

BestKnownHost offers a flat fee solution for your existing DDoS problems. The BestKnownHostWebsite Security Deluxe programme gives you access to the needed nology within a few easy steps. The deluxe programme includes a CDN (Content Delivery) and a WAF (Web Application Firewall) powerful enough to curb a DDoS attack of any size.

A CDN helps diminish , while WAF helps to lessen the exploitation of your site’s vulnerabilities. With this nology in hand, you have access to an uncomplicated, fully inclusive experience.

Performing the 2-click Task

Experience: Beginner

Time: Less than 2 minutes

BestKnownHost offers a fully inclusive solution, which only requires one click to activate.

Enabling the DDoS protection

Experience: Beginner

Time: Less than 2 minutes

The Deluxe BestKnownHost option offers basic DDoS reduction by default. When an unexpected load of heavy traffic hits your site, you can enable the emergency DDoS protection software to dynamically obstruct incoming POST requests. This will immediately reduce the burden on your bandwidth.

Doing the steps Mentioned above will diminish any external DDoS attack, but you can take the below steps to further secure your websites if you’d like to.

Block Site Visitors

Experience: Intermediate

Time: Less than 2 minutes

For additional protection, you can block whole countries with BestKnownHost’s Security Solution. You have a choice of obstructing view requests (GET) or interaction requests (POST). If people still need to view your content, You should choose a POST block. If you want to prevent them from seeing your site and interacting with it altogether, both a POST and GET block should be done.

To do this action, navigate to Domain Name > Access Control > Geo-Blocking, as demonstrated below.

Restrict Server Access

Experience: Intermediate

Time: 30 minutes

If you’ve never used a reduction tool similar to BestKnownHost, there’s a chance that your IP origin has already been exposed. Because an attacker goes straight to the origin IP when doing a DDoS attack, this is problematic. Your attacker will be able to bypass all security controls deployed.

To alleviate this issue, you need to obstruct direct access to your server. Obstructing access can be done at the webserver or via .htaccess.

While Authorizing direct access from BestKnownHost’s IP ranges, you need to obstruct all others.

In .htaccess, this might look like: 

Run a Separate Email Service

Experience: Expert

Time: 1 hour

If you run emails and your website on the Same server, an attacker will always be able to find your origin IP address. Using an email service on a different server is the best way to eliminate this security gap. You can run an unlinked email server through a hosting provider or a third-party service provider like OpenXchange or O365.

If you’re a Mac user, run the following command in Terminal to view the IP being reported:

dig +short $(dig mx +short WEBSITE)

If I was concerned about, I would enter:

dig +short $(dig mx +short

If you’re a PC user, run the following command in your command prompt to view the IP being reported:

nslookup -q=mx WEBSITE

Example: nslookup -q+mx example,com

Attackers will always be able to find an IP address of both Mac and PC devices. You need to ensure that your email IP is different from your web server’s one. An attacker will always be able to find your IP if it’s shared with your email’s IP address.

Final Words

The best way to prevent a DDoS attack is to be proactive. Visit a site like BestKnownHost to view different WAF options. Don’t wait for a DDoS attack to be in progress before understanding how important protection is.

Post a Comment