DDOS Attack in ASP.NET with State Server Session -


cant find issue anywhere...

using asp.net 3.5, have 3 web servers, in web farm, using asp.net state server (on different server).

all pages uses session (they read , update session)

issue: pages prone ddos attack, easy attack, go page, , hold down 'f5' key 30-60 seconds, , request pile in web servers.

i read, if make multiple call session each lock session, hence other request has wait same user's session, waiting, causes ddos.

our solution has been pretty primitive, preventing (master page, custom control) call session , allow page call, adding javascript disable's f5 key.

i realize asp.net session prone such ddos attacks!!

anyone faced similar issue? global/elegant solution? please share thanks

check this:

dynamic ip restrictions: dynamic ip restrictions extension iis provides professionals , hosters configurable module helps mitigate or block denial of service attacks or cracking of passwords through brute-force temporarily blocking internet protocol (ip) addresses of http clients follow pattern conducive 1 of such attacks. module can configured such analysis , blocking done @ web server or web site level.

also, check this:

dos attack: sites/datacenters control (d)dos attacks via hardware not software. firewalls, routers, load balancers, etc. not effeicent or deesirable have @ application level of iis. don't want bloat slowing down iis.

also ddos preventation complex setup deadicated hardware boxes deal with different rules , analysis them take lot of processing power.

look @ web enviornment infrastucuture , see setup , see hardware provides protection , if problem @ dedicated hardware solutions. should block ddos attacks possible in chain, not @ end @ webserver level.


Comments

Popular posts from this blog

monitor web browser programmatically in Android? -

Shrink a YouTube video to responsive width -

wpf - PdfWriter.GetInstance throws System.NullReferenceException -