How to prevent attacks from "DDOS Kid"?

Greetings,

Well as you might know, InfinityFree is a 100% free hosting platform and because it’s free then the server isn’t as good as paid server, especially in Anti-DDOS attack. And if you are one of the victims that got DDOS’ed and got your hosting suspended, I’m so sorry about your situation and the only think that you can do is open a ticket and tell Admin to re-active your hosting.

So is anyway to stop or block those kid?

At this moment, I can only answer this question with a yes and no. Why yes and no you might ask? Because you can’t imedially block or stop the attack instantly, you just can’t. InfinityFree isn’t design their hosting to be super durability and because of that, they don’t design some kind of feature to block DDOS attacks. But there is a way to block some kid (if they just use DOS attack [DOS is basically like DDOS attack but instead of mutil IP address attacking you, DOS is just one IP]).

Inside your hosting panel, you can see a big section that says “Security”:

Click on “IP Blocker”, choose the domain that you want to block the IP and enter the IP that you want to block.
Note that this method only work if you know that kid’s IP address or their server IP address and this method is not the most efficient way to stop the attack. If you use a custom domain (the domain that you buy), you can use CloudFlare, it can help you to prevent DDOS for your hosting (Stay tuned, I’ll make a full tutorial on how to block DDOS attack using CloudFlare).

And that is all i want to say to you. If you have any good way to prevent kid DDOS your website, let me know in the comment. Have a good day!

Being the target of a DDoS attack is terrible, and I completely understand that you think it’s not fair and you want to do something about it.

However, what I often see after that are a large number of misconceptions about how DDoS attacks work and why dealing with them is hard.

I’ll try to cover some of them in a not too rambly way.

Misconception 1: You can block or filter DDoS attacks

People often believe that there is just some kind of magical “anti-DDoS” thing you can just enable and to “just block” the attack and solve the problem.

That’s not how that works, and that doesn’t exist.

The nasty part of DDoS attacks is that:

  • The attack is coming from a lot of different IP addresses, so blocking individual IP addresses is a fools errand.
  • The attacker will deliberately try to make traffic appear as regular web traffic as much as possible.

So you can’t “just block” DDoS traffic, because it’s hard to identify.

There are methods, systems and services that can analyze network traffic, identify anomalies and push configuration to block the anomalous traffic. But these solutions can only mitigate attack traffic, not block them entirely.

But you must understand that these systems can be very costly, and often take a lot of fine tuning to be able to reliably distinguish legitimate traffic and attack traffic. And even they will still get it wrong sometimes.

Misconception 2: If you have DDoS blocking/filtering, you are safe

So you have your DDoS mitigation setup, so now you are safe, right?

No.

DDoS mitigation will only mitigate the problem. It will reduce it, but not eliminate it.

Suppose you have a solution that can block 99% of a DDoS attack. But if that attack generates 1000 times the usual traffic. Your DDoS filtering will stop most of it, but you’re still left with your website being hit with 10 times the usual traffic.

That can still be enough traffic to bring down your website, even though you have DDoS protection.

Misconception 3: You can block DDoS attacks with code on your website

For the most part, this is not true.

DDoS attacks come in many flavors, using different methodologies, patterns and traffic types.

But the general rule is that any attack traffic should be stopped as early in the chain as possible. Ideally you want to prevent the traffic from hitting your network entirely, or else block it on the server at the network level. The more “processing” you do on the attack traffic, the more load it generates, and the more likely the traffic will overload the server.

Running PHP code is comparatively a very resource intensive process. Trying to detect DDoS attacks on this level is extremely ineffective, because by the time attack traffic is causing PHP code execution, it has already done it’s job of generating system load.

Blocking IP addresses with .htaccess rules is slightly better, as those rules are pretty efficient. But then you’ll still need to somehow manually identify and block all attack IPs, which as I wrote before, is a fools errand.

And on free hosting specifically, know that even hits that are blocked are still counted towards your hits usage. So blocking attacks there will do absolutely nothing to stop you from reaching the hits limit.

Misconception 4: Cloudflare blocks all DDoS attacks

Cloudflare blocks some attacks. Mostly network level attacks, like DNS floods, are very effectively blocked by Cloudflare because it is technically just impossible to tie that traffic to individual websites and forward it.

Against HTTP attacks, Cloudflare does very little by default. To prevent impact to legitimate visitors, Cloudflare lets through basically anything that looks legit, even if that traffic is 10,000 times your usual traffic. It can sometimes detect some attacks, but generally it’s way too little, way too late.

Only “I’m under attack” mode (and maybe Bot Fighting Mode?) effectively block attacks, but that mode is also quite intrusive to visitors, and is not something you’d typically want to keep enabled for everyone.

Misconception 5: Free hosting does not have DDoS protection

“My website went down because of a DDoS attack, why doesn’t free hosting have DDoS protection” is something we hear a lot.

But free hosting has DDoS protection. iFastNet has been doing this for decades now, and has a lot of experience unfortunately dealing with very big DDoS attacks. With basically every attack, they have investigated the issue, and implemented measures to prevent such attacks from causing more damage. This has resulted in a wide range of measures that can help combat various types of attacks, most of which are confidential for obvious reasons.

The blocking of ping traffic is an example of one measure that was taken after a DDoS attack.

Did you notice it has been quiet recently regarding the DDoS attacks that triggered the extreme hits usage? That’s because measures have been implemented to help detect and block such attacks.

So why do websites still get taken down because of attacks? Because:

  • Any DDoS protection system can only protect against the kinds of attacks it can detect. Other types of attacks may not be identified as such at first.
  • Even handling the blocked traffic can still generate considerable system load, which is not something we can just let you use indefinitely for free.

Misconception 6: Premium hosting has better DDoS protection

Considering everything I’ve written above, you should understand by now that blocking DDoS attacks is not something you can just throw some money at and make the problem go away.

With both free hosting and premium hosting, iFastNet is doing what they can to block attacks as best they can. Premium hosting being premium doesn’t automagically give it better attack protection.

Premium hosting does have some advantages compared to free hosting:

  • Account limits are less harshly enforced. For example you won’t be automatically suspended for a full day because your account got more hits than some fixed number.
  • Account limits are higher, so even if your website does get attacked, it’s more likely that it will just be able to take the load.
  • Premium servers are less heavily loaded in general, and have much fewer accounts on them, so a single website being attacked doesn’t cause as big of a problem for other customers on the server.

I have actually seen websites on premium hosting get disabled too because they were flooded with attack traffic and had to be disabled to prevent harm to other websites on the server.

So premium hosting doesn’t have better attack protection. It just has more server capacity so that anything that’s not blocked isn’t as likely to cause issues.

10 Likes