Scenario:
E-commerce website遭受大规模DDoS攻击,导致服务中断和收入损失。
Attack Details:
Initial Symptoms:
- Server response time > 10 seconds
- 503 Service Unavailable errors
- CPU utilization at 95%+
- Network traffic spike to 8Gbps
Attack Vector Analysis:
- Source IPs: 15,000+ compromised bots
- Packet types: SYN floods, UDP floods
- Target ports: 80, 443, 8080
- Duration: 4 hours continuous
Defense Implementation:
! Router Configuration for Rate Limiting
ip access-list extended DDoS_PROTECTION
deny tcp any any eq www log
deny tcp any any eq 443 log
permit ip any any
! Enable TCP intercept
ip tcp intercept list DDoS_PROTECTION
ip tcp intercept connection-timeout 30
ip tcp intercept finrst-timeout 2
ip tcp intercept max-incomplete low 2000
ip tcp intercept max-incomplete high 3000
! Configure BGP Flowspec
router bgp 65000
neighbor 198.51.100.1 activate
neighbor 198.51.100.1 send-community both
! Apply rate limiting
flowspec
match destination-port 80 443
action rate-limit 1g
Post-Attack Analysis:
- Impact: 4 hours downtime, estimated $250K revenue loss
- Root Cause: Unpatched web server vulnerability
- Lessons Learned: Implement CDN, rate limiting, and monitoring
- Preventive Measures: Regular security assessments, incident response plan