What is the principle of CC attacks? CC attacks belong to DDOS attacks, so the principle is the same between them, that is, sending a large amount of request data to cause the server to deny service, is a connection attack. Attackers control some hosts to continuously send a large number of data packets to the target server, causing its resource exhaustion, so that the CPU in 100% state for a long time, until the crash down.
CC attacks are classified into three types: direct attacks, proxy attacks, and botnet attacks. Direct attacks are mainly aimed at critical defects
WEB applications, in general, only have problems with the writing of the program when this happens, relatively rare.
1. Unbind the domain name
The CPU of the Web server returned to normal immediately, and the CONNECTION over IP was fine. However, the disadvantages are also obvious. Canceling or changing the domain name brings inconvenience to others’ access. In addition, it is invalid for IP CC attacks, even if the attacker discovers the new domain name, he will attack the new domain name.
2. Change the Web port
The Web server provides external services through port 80. Therefore, attackers use the default port 80 to attack. Therefore, we can modify the Web port to prevent CC attacks.
3. IIS shielding IP
CC attack source IP address, you can set IIS to block the IP address to the Web site access, so as to achieve the purpose of defending IIS attacks.