Utility focussed

DDoS Mitigation Strategies

DDoS MitigationA Denial-of-Service is basically a way to block the resources of a computer system, so that no users can access them. This article is about DDoS Mitigation.

With the advent of the internet age, network security has become the most important issue. The fact that network hackers have kept up with the pace of network security methods and heuristics, is only a grim realization of its gravity.

DoS (Denial-of-Service) attack is just a way to bring down a heavily-trafficked website for some time, and this time could be hours, days or even weeks. Let us try to shed some light on DDoS and some common preventive measures against it.

What is a Denial-of-Service attack?

A Denial-of-Service (DoS) is basically a way to block the resources of a computer system, so that no users can access them. In terms of the internet, DDoS consumes all the resources of a network by sending the victim imposturous traffic, laden with broken links in huge amounts.

The Distributed Dos (DDoS) has been just an advanced form of this attack, where the DoS attackers spread out wide enough on a huge network (such as the Internet). The script written by the programmer is sent to hundreds, or even thousands of computers which themselves start acting as “bots”, creating a “BotNet”. Then this network acts on behalf of the hackers, attacking target systems and/or networks.

Such DDoS attacks have been known to cost revenue losses worth millions in the past.

DDoS Mitigation Strategies

DDoS mitigation strategies could be divided into two different categories based on the skill level or the troubleshooter

  • Basic Level
  • Advanced Level

Basic Level

  • Keep yourself informed about exactly what resources are being utilized, the services running, the bandwidth usage and also the demand for data or files.
  • Update the network kernel to its latest version
  • Install critical security updates
  • Disable any unknown or unwanted services
  • Data Packets are handled by network card drivers; keep them updated.
  • Appropriate iptables/Netfilter firewall should be used to deny access to any bad packets.
  • Use the following to know whether port 80 is under attack by too many IPs:

netstat -plan|grep :80 |awk ‘{print $5}’ |cut -d: -f1 |sort |uniq -c |sort -n

Advanced Level

  • Make sure that you use all the latest technology on your network
  • Using Cacti, SNMP, MRTG allows one to centrally monitor all the traffic, and any events off DDoS on the network.
  • Limit the number of connections to a server. Giving preference to existing connections over new connection requests helps.
  • Be on the lookout for appliances and applications which would alert you if the traffic reaches a certain maximum threshold. Then using techniques such as ‘dynamic filtering’ and ‘anomaly recognition’ one can inspect the incoming traffic for any broken or bad packets.
  • Block any addresses which are not approved by the IANA, also called ‘dark addresses’.

Read through this special DDoS attack tutorial to learn more about DDoS mitigation strategies.



  1. Pingback: DDoS Attack Tutorial | TechPluto

  2. Anand Das

    July 7, 2011 at 1:13 pm

    Hey this is really a very nice piece. Highly informative and useful!

    I tried out the port 80 thing and it really helped me identify the problem. Great help! 😀

    • Prashant Sharma

      July 7, 2011 at 1:37 pm

      @anand Glad you liked it. DDoS Mitigation is critical need in today’s scenario and such techniques can be helpful without hiring paid DDoS Mitigation experts.

  3. Anand Das

    July 7, 2011 at 2:12 pm

    hey i was wondering if techpluto could provide some free tool or software to prevent or manage ddos attacks.. also u rite really well.. keep it up

    • Prashant Sharma

      July 7, 2011 at 10:01 pm

      Thanks Tony for passing on that link for DDoS mitigation related softwares. Well, I must admit the credit for this article goes NOT to me but my editorial team(Harshit Sinha) working behind the scenes

  4. Tony Grisham

    July 7, 2011 at 2:17 pm

    hi Anand
    you could check out this link


    you might get what you want there..

    this is a really nice work here,
    webmasters hark!

  5. sibendu

    July 8, 2011 at 2:03 am

    how much i will pay to ddos protection? if web hosting service is nt doing ddos protection how to handle it?

  6. xxkiltrest

    July 8, 2011 at 7:28 pm

    nice work this.
    can your team feature a piece reviewing google+ and possible effect on facebuk..

  7. Prashant Sharma

    July 8, 2011 at 11:36 pm

    @xxkiltrest Thanks for your appreciation on DDoS mitigation article. Credit goes to Harshit Sinha, part of our editorial team and author of this article. And sure, just hang in there and you will soon see a post on TechPluto reviewing Google+ and possible effect on Facebook.

  8. GabloFX

    August 20, 2011 at 9:22 pm


    Im interested in how to execute a DDOS Attack.

    Im using an Apple Mac computer!!


  9. randka w uk

    August 30, 2011 at 3:25 am

    Sweet site, super design , really clean and apply pleasant.

  10. Rebecca Poort

    September 5, 2011 at 5:04 pm

    Though Id disagree on some of the finer particulars, I believe you probably did an superior job explaining it. Positive beats having to research it on my own. Muchos Gracias on your post.

  11. Reva Tessendorf

    September 20, 2011 at 7:49 pm

    Hello, Thank you for the excelent writing. It in fact was a nice short read. I will come back to enjoy more of your excellent reads. By the way, how can we communicate? Thanks.

  12. Jean Argudo

    September 23, 2011 at 4:16 am

    Hi there are using WordPress for your site platform? I’m new to the blog world but I’m trying to get started and create my own. Do you need any html coding knowledge to make your own blog? Any help would be really appreciated! Thank you!

  13. bar franchise

    September 23, 2011 at 3:04 pm

    This nephew appeared to be laughing at everyone if reading this brand upon your blog “

  14. Emelina Hummell

    September 23, 2011 at 6:28 am

    I loved as much as you’ll receive carried out right here. The sketch is tasteful, your authored subject matter stylish. nonetheless, you command get got an impatience over that you wish be delivering the following. unwell unquestionably come further formerly again as exactly the same nearly very often inside case you shield this hike.

  15. Madie Zimmerle

    September 24, 2011 at 12:05 pm

    Hello There,I think this is read is very interesting and one of the better things I’ve read latley. But I want to say that your website style is perfect, the articles are really nice. Wonderful Job, Chow !

  16. Cordell Luckado

    September 27, 2011 at 7:36 am

    Hi There,I like the helpful info you provide in your article. Ill bookmark your weblog and check back again here frequently. I’m quite certain I will learn many great things, here! Best of luck! Thank you, very much.

  17. Berta Cyrus

    September 28, 2011 at 1:18 pm

    I was curious if you ever considered changing the layout of your site? Its very well written; I love what youve got to say. But maybe you could a little more in the way of content so people could connect with it better. Youve got an awful lot of text for only having 1 or 2 images. Maybe you could space it out better? Thanks!

  18. Vilma Visaya

    September 28, 2011 at 9:47 pm

    Hey there! Would you mind if I share your blog with my zynga group? There’s a lot of people that I think would really enjoy your content. Please let me know. Thanks

  19. Richie Schnobrich

    September 29, 2011 at 9:29 am

    Howdy this is kinda of off topic but I was wondering if blogs use WYSIWYG editors or if you have to manually code with HTML. I’m starting a blog soon but have no coding know-how so I wanted to get guidance from someone with experience. Any help would be greatly appreciated! Regards!

  20. Pingback: Ddos attack tutorial | Explore the internet together

  21. Jerilyn Cereo

    October 29, 2011 at 1:53 am

    I like this web site very much, Its a real nice position to read and receive information. Thanx.

  22. Laure Feist

    October 30, 2011 at 5:57 am

    Very nice style and wonderful articles , nothing at all else we require : D. Best Regards.

  23. Gustavo Bennion

    October 30, 2011 at 8:49 am

    Hi, It’s like you read my mind! You appear to know a lot about this, like you wrote the book on it or something. I think that you could use some Photo’s to drive the message home a bit more, but other than that, this is wonderful blog. A great read. I will definitely be back. Thanks.

  24. Eddy Wetherington

    October 30, 2011 at 10:18 pm

    Hmm it looks like your site ate my first comment (it was super long) so I guess I’ll just sum it up what I had written and say, I’m thoroughly enjoying your blog. I too am an aspiring blog blogger but I’m still new to the whole thing. Do you have any helpful hints for rookie blog writers? I’d certainly appreciate it.

  25. scooter in beijing

    November 1, 2011 at 1:53 am

    i am setting up A web portal for my business. and i want to know the copyright guidelines, specifically the legality of copying other articles from other websites. in other words, is it ok to copy an article from another site and paste it in my site ( of course, i will be putting the reference source or link it in to my site)? need hard core data please. if possible a weblink. thanks..

  26. acheter cialis sur internet

    November 21, 2011 at 9:27 am

    Really worthwhile article. Pay attention

Leave a Reply

Your email address will not be published. Required fields are marked *

To Top
Catch the latest news from Startup World in your Inbox!