您可以采取哪些步骤来最大限度地减少 IIS 中潜在 (D)DoS 攻击的影响?
为了简单起见,使用单服务器设置,您可以采取哪些步骤来最大限度地减少 (D)DoS 攻击? 考虑到这些步骤的有效性和对“普通”用户的影响,真的值得采取这些步骤吗?
[编辑] 我还想包含您需要注入到代码中才能应用的步骤,而不仅仅是 IIS 设置。
With a single-server setup for simplicity, which steps could you do to minimize the attacks of a (D)DoS attack? And is it really worth it taking these steps, considering their effectivity and impact on 'normal' users?
[EDIT] I also meant to include steps which you would need inject into your code to apply, not only IIS setup.
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(2)
一个好的开始点是拥有一个良好的防火墙,可以在每秒进行大量请求时阻止 IP。
IIS 锁定工具可能很有用:http://technet .microsoft.com/en-us/library/dd450372(WS.10).aspx
A good point to start it´s having a good firewall that blocks IP when they are doing a lot of petitions per second.
The IIS LockDown Tool can be useful: http://technet.microsoft.com/en-us/library/dd450372(WS.10).aspx
-- 确定预期的用户/连接数量并限制连接。
-- URLScan 可以过滤掉不需要的请求.. 在 iis.net 上搜索 URLScan
:)
-- Identifying the expected number of users/connection and limiting the connection.
-- URLScan can filter out unwanted requests.. search for URLScan on iis.net
:)