English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

2 answers

Dedicated hardware acts as a "DOS firewall" and ONLY allow valid requests through. Devices like NetScaler come to mind. The sit inline with the internet feed and they act in the TCP/ip stream level. They ask for protocol level ACK messages and look for certain patterns of traffic. They work quiet well.

2006-12-25 03:41:03 · answer #1 · answered by TheAnswerMan 4 · 0 0

Most websites domain are maintained by large web companies like godaddy.com. These company have sophisticated filters. When a website is under a DoS attack, it is being flooded with requests. To fix the problem, bogus requests are filtered out while genuine requests are connected. These filter programs have heuristic features or limited artificial intelligence. Basically, they learn from experience. With time and training, the filters can distinguish requests from a DoS attack from genuine requests. There are also safeguards which shutoff traffic when a very large number of request is detected. For example, Microsoft servers have experienced numerous DoS attacks but they have never been disrupted - I guess someone in MS knows what they are doing.

2006-12-25 03:49:09 · answer #2 · answered by What the...?!? 6 · 0 0

fedest.com, questions and answers