Anti Flood attack?

saosangmo

Verified User
Joined
Oct 3, 2012
Messages
113
Location
Hanoi
Hi all,
On one vhost, I see many thousands of lines:

102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:24 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:25 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:25 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:25 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:25 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:25 +0700] "GET / HTTP/1.1" 200 248 "-" "-"
102.116.116.98 - - [08/May/2014:11:04:25 +0700] "GET / HTTP/1.1" 200 248 "-" "-"

It caused my server over usage.

In the future, if I can terminate all of the same requests automatically?

thanks
 
A "D"DOS attack will come from many different IP's.
Your attack comes from one IP it seems.

I'm not to experienced with CSF/LPF, but doesn't it have some sort of flood-prevention for this type of hits?
 
oh, sorry, this is a flood attack type.
Could anybody help me config CSF to prevent this attacker in the future.
thanks
 
I've renamed the thread to indicate the emphasis on flood prevention.

You can check the CSF configuration from DirectAdmin. Search for the word flood.

One section to look at: Port Flood Settings

Jeff
 
As I see it, you're both right. If it's too large an attack you probably want to block it upstream from your server if your upstream wll cooperate and has the equipment. Simply because it's possible to overload your local system if you're relying on your own firewall.

Best bet is for your upstream to null-route any requests from that IP#. But many of us are likely on our own.

Jeff
 
Back
Top