If you can not access your files or websites that may indicate that your computer or your organization is under attack.

As I can prepare my business against possible DDoS attack

DDoS stands for Distributed Denial of Service. Translation practice means that the server is attacks from many computers so that it stops working.

DDoS attacks are increasingly more frequent. Organizations such as Anonymous have used them to 'throw' pages of companies and organizations as Mastercad, the FBI, the General Society of authors and publishers or the Ministry of culture.

To explain the process we can use a simple analogy, in which our server is an Assistant who attends to people in a window.

Our Assistant is very efficient and is capable of serving several people at once without disheveled: is his normal load. But one day they begin to arrive hundreds of people at the counter to ask for things to our auxiliary. And as any normal human, when there are many people bothering you cannot satisfy all and starts to respond slower than normal. If still more people probably comes saturated finish and will run the window and already do not assist anyone more.

The same thing happens on the server: when there are too many requests runs out of resources, hangs and stops working. Maybe it goes directly or let only respond connections. Of either of the two forms, server not back to normal until the attack stops, either because the attackers have stopped or are managed to block illegitimate connections a DDoS attack is really something concrete, one swipe and effective, but is not something that lasts a long time. Therefore, they are only effective if they manage to leave the page without service prior to your administrators can take action, how to redirect traffic to other servers or locate the origin of the attack.

DDoS attacks on my web

For this reason, there are some companies that are 'immune' to the DDoS. Succeed with an enormous investment in servers (of iTunes, for example, would cost Apple $ 1.3 billion a year). In this way, they achieve a DDoS attack against their data centers may not be effective, because they can perfectly support the traffic.

In recent years, cases of organizations have been business, that use distributed denial of service (DDoS) attacks, to attack his competition.

63% Of it managers in organizations are concerned about this type of attacks, and at least 38% of companies have suffered a DDoS in the last year.

The DDoS have generally been associated with ideological and political reasons. Traditionally, such attacks are used to 'lose' the website of an organization. However, more than 50% of the surveyed companies blame their main competitors when they suffer an attack.

In the case of companies that cannot afford to maintain a network of servers, they may choose to cooperate with other companies to combat these attacks. the advantage of this option is that they pay a small amount, but they gain the benefits of a massive data center.

Due to the above, if you think you're too small or too irrelevant to be an interesting victim to a hacker, best pieselo again. Any organization is a possible victim and most of us are vulnerable to DDoS attacks. Both if it's a global company in the Fortune 500, a government agency or an SME, all of them are within the list of objectives of current cybercriminals prevent an attack the first line of Defense should be prevention. Being aware of the vulnerability of any site to this type of attack, is convenient to design technological structure that supports the service based on best practices of availability. This includes not only the infrastructure and applications, but also critical services such as DNS.

Secondly, the structure should be analysed to identify potential bottlenecks that may be more sensitive to this kind of attack. These cracks can be detected in different components of the infrastructure, including servers, applications, Internet, firewall, database server provider or even load balancer. Sometimes these vulnerabilities can be avoided with simple changes in the configuration (maximum number of connections, memory limit, etc.).

Improve strength and flexibility by denial of service attacks usually occur through systems with bottlenecks and overwhelmed. Wherever possible, we should improve the strength and flexibility of the network with high performance components and highly redundant, as well as policy-based bandwidth management.

For example, some next-generation firewalls can combine a design muli - core scalable massively with deep packet scanner technology to allow scanning of threats and applications simultaneously as well as the scanning of all the sizes and connections to gigabit speeds. This type of firewall can be configured for performance and optimum flexibility under attacks, with high availability of active/active failover, control and application intelligence, and bandwidth prioritization.

What to do before an attack?

Even if you correctly identify a DoS attack or DDos, it is unlikely that you can identify the source of the attack or its purpose. Contact the appropriate technical professionals for assistance.

If you notice that you cannot access your own files or access any website from their network, contact your system administrator. This may indicate that your computer, or the network of your organization are under attack.

If you have a similar experience on your home computer, consider contacting your service provider Internet (ISP). If there is a problem, your ISP can advise you regarding the best course of action.
DDoS attacks on my web traffic news