CodeVerge.Net Beta


   Explore    Item Entry   Register  Login  
Microsoft News
Asp.Net Forums
IBM Software
Borland Forums
Adobe Forums
Novell Forums

MS SQL 2008 on ASP.NET Hosting
Free 3 Months



Zone: > NEWSGROUP > Asp.Net Forum > windows_hosting.hosting_open_forum Tags:
Item Type: NewsGroup Date Entered: 3/22/2008 3:57:40 PM Date Modified: Subscribers: 0 Subscribe Alert
Rate It:
(NR, 0)
XPoints: N/A Replies: 2 Views: 37 Favorited: 0 Favorite
Can Reply:  No Members Can Edit: No Online: Yes
3 Items, 1 Pages 1 |< << Go >> >|
Ahmadi_rad
Asp.Net User
Dos Attacks, what to do?3/22/2008 3:57:40 PM

0/0

Dear guys

I'm developing a web application that needs to upload data to a sql server from client machins(direct login to server or use web services), and it's a rather long time that I concerned the matter of DOS attacks, but can't find a total solution for that.

The best thing I found was tracking IP address of end users(http://weblogs.asp.net/omarzabir/archive/2007/10/16/prevent-denial-of-service-dos-attacks-in-your-web-application.aspx), but this can be easily overcome by spoofed IP addresses. now I think there is not so much that I can do for this matter, but rely on capabilities of host.

I wanted to ask you guys for a general overview. What shall we ask from hosting company? Is there even a thing that they can do to ask from them?

How large companies like credit card processing companies overcome this problem? Can we use the same methods?

Is it better to use services of such companies like hosting by Yahoo?

Are any web hosting companies well known to be reliable against such attacks?

Or any other points that you may find usefull.

Thanks a lot

 

Bruce L
Asp.Net User
Re: Dos Attacks, what to do?3/26/2008 12:26:32 AM

0/0

Most people would do take on a strategy of block everything other than the whitelisted IPs.  I am not sure what your application's intentional use is and am not sure if this is applicable in your situation.

If your users base are all registered user with a known IP, I would blist everything and have them insert their IP into the whitelist.

Another strategy you can consider is to have restriction in time between each call.  It is rather complicated, but doable.  In your web service, you would track the user's last connection time and in every connection, you check if they are connecting too frequently.


Bruce
DiscountASP.NET: Developer Ready ASP.NET Web Hosting
- Microsoft Gold Certified Partner
- Voted 2007, 2006 & 2005 Best ASP.NET Web Hosting by asp.netPRO Magazine
Ahmadi_rad
Asp.Net User
Re: Dos Attacks, what to do?3/26/2008 8:51:29 AM

0/0

My attention to this matter may be too much paranoid!

In fact I'm blcoking time consuming operations for too frequent users. And I'm also checking IP address of incomming requests and block too frequent IPs. This may be more than enough for a small business which has registered users.

But my question were about IP snoofing and sending too frequent incorrect login requests to system. This may not happen to my site, but even if it happens, there doesn't seem to be a way for defending for me.

Anyhow, if it happens or not, I prefere to rely on hosting companies whom pay attention to this matter. 

Thanks a lot

3 Items, 1 Pages 1 |< << Go >> >|


Free Download:

Books:
Network Security: A Beginner's Guide Authors: Eric Maiwald, Pages: 475, Published: 2003
Information Security Management Handbook Authors: Harold F. Tipton, Micki Krause, Pages: 2036, Published: 2006
Planning for Survivable Networks: Ensuring Business Continuity Authors: Annlee Hines, Pages: 336, Published: 2002
CISSP All-in-one Exam Guide: Exam Guide Authors: Shon Harris, Pages: 1145, Published: 2007
CCSP Complete Study Guide: Exams 642-501, 642-511, 642-521, 642-531, 642-541 Authors: ebrary, Inc, Wade Edwards, Todd Lammle, Tom Lancaster, Justin Menga, Eric Quinn, Jason Rohm, Carl Timm, Bryant Tow, Pages: 1213, Published: 2005
The Best Damn Firewall Book Period Authors: Thomas W. Shinder, Anne H. Carasik, Cherie Amon, Robert J. Shimonski, Debra Littlejohn Shinder, ebrary, Inc, Pages: 1293, Published: 2003
Security+ Study Guide and DVD Training System: study guide & DVD training system Authors: Syngress, Michael Cross, Norris L. Johnson, Robert J. Shimonski, Tony Piltzecker, Debra Littlejohn Shinder, Pages: 784, Published: 2002
CompTIA Security+ Study Guide: Exam SY0-101 Authors: Mike Pastore, Michael A. Pastore, Emmett Dulaney, Pages: 552, Published: 2006
Hacking Exposed: Web Applications Authors: Joel Scambray, Mike Shema, Caleb Sima, Pages: 520, Published: 2006
Law in an Era of "smart" Technology Authors: Susan W. Brenner, Pages: 194, Published: 2007

Web:
Understanding Denial-of-Service Attacks Even if you do correctly identify a DoS or DDoS attack, it is unlikely that you will be able to determine the actual target or source of the attack. ...
CERT/CC Denial of Service Denial-of-service attacks can essentially disable your computer or your network .... If you are interested in trying do to so, contact your service provider ...
Denial of Service or "Nuke" Attacks Often the victims are people on Internet Relay Chat (IRC), but DoS attacks do not involve IRC servers in any way, so IRC operators (IRC ops) cannot stop or ...
Denial of Service attack May 24, 2006 ... DoS tools are programs that can be used to make denial of service attacks against any machine in the Internet - typically a web server. Do ...
How to perform a Denial of Service [email protected] OK, here's the thing, please don't fucking do this. A Denial of Service attack is probably the easiest way to cost big businesses that rely on web sites ...
Denial-of-service attack - Wikipedia, the free encyclopedia Attacks on wired networks of course do not require any NICs or external antennae , .... A distributed denial of service attack (DDoS) occurs when multiple ...
Network Ingress Filtering: Defeating Denial of Service Attacks Introduction A resurgence of Denial of Service Attacks [1] aimed at various .... will be more resources for tracking the attacks which ultimately do occur. ...
Permanent Denial-of-Service Attack Sabotages Hardware - Security ... May 19, 2008 ... Unlike the infamous distributed denial-of-service (DDOS) attack -- which is ... “It seems like if you can do a remote update of firmware, ...
WWW Security FAQ: Securing Against Denial of Service Attacks Feb 23, 2003 ... Q10: What is a "smurf attack" and how do I defend against it? smurf is a simple yet effective DDoS attack technique that takes advantage of ...
D S A U SQL W Therefore a DoS attack against an application no longer takes 1000 bots, anyone with a decent. Internet connection can do this! ...

Videos:
How to do a DoS attack with CMD NOTE: DoS are illegal all around the world and this video is for educational purposes only! ~ This is just an example of a DoS attack, the 'ping ...
DDOS attacks-solutions 11/07 RioRey, Coerte Voorhees, EP malicious cyber tool that can easily shut down critical Interoperability systems. DDOS Attacks. DDOD is latest and potentially most lethal in the ...
RioRey DDOS Attack Prevention DDOS, The New Internet Threat RioRey prevents DDOS attacks before they even reach your network. BusinessNOW goes behind the scenes with this ...
Explaining Distributed Denial of Service (DDOS) Attacks on ... While campus leaders have gradually come to understand and appreciate the risks associated with security threats such as viruses, spyware ...
DoS attack yeah me making a DoS attack www.winvistaside.de/forum/ the server was full 10 minutes down =) imagine that this could have been google or ...
Denial Of Service Attack on JIDF Try it out :-)
25c3 "TCP Denial of Service Vulnerabilities" Fabian Yamaguchi Recording from the 25th Chaos Communication Congress 2008 TCP Denial of Service Vulnerabilities Accepting the Partial Disclosure Challenge ...
Re: How to do a DoS attack with CMD HAHAHA DONT WORK Xd
DoS attack against windows FTP DoS attack using a exploit
An Example of DoS Attack Shows how vulnerable a website can be!




Search This Site:










composite control execution order problem

validator triggers by itself

server control with property type "color"

custom designeractionlists

host recommendations

html server controls

styling web user controls

simple automation control

where is my description text for my property?

which one is better custom control or user control

building composite control problem , please help

component and enumeration values

new web-site creation

custom web control

issue w/ using an array of a valuetype as a member property of a custom server control

the code directory??

custom controls

setting the left and top style properties while in design mode.

dynamic control

static ip address

user control -> server control

set background to dynamically created htmltable

e-commerce confusion reigns

simple: saving collection property

getting postback data.

help, i've fallen (into an admin pit) and i can't get up(dated)...

designer problem: providepropertyattribute not serializing in webform

composite control: controls collection of child control is cleared during page execution cycle

how to set focus in web control?

composite control problem with bubble events

  Privacy | Contact Us
All Times Are GMT