How to protect website from DDoS attack ?


New Member
Use a provider that has integrated ddos protection.
CloudFlare (or similar)
Nginx + mod_security (but depends on many things, it's not a one-size fits all solution)


I suggest you to order good DDoS protection. You can read reviews and choose the best protection which will be suit you for price and efficiency.


New Member
Agreed with the recommendation that if you're concerned about DDoS that you pick your provider carefully - ensure he has additional DDoS protection. Cloudflare isn't set up to protect against DDoS attacks - it only give you the ability to monitor the attack when it happens. If it's to protect a games server, I think one has to go all out to get a host who specializes in games servers as if he is a serious games server host, he'll have purchased additional DDoS protection and be able to offer this to you.


New Member
I agree, using CDN is the most popular when it comes to protection, but you can also buy a good DDOS protection for your server.


New Member
If you're operating the infrastructure:
  1. Large pipes to protect against attacks that are trying to saturate your bandwidth: 10Gbs - N x 1Tbs, depending on size you want hold against
  2. Routers that can do N x Mpps - against attacks that try to saturate your number of packets per second
  3. A hardware solution that cleans traffic, like Arbor


New Member
To protect website from DDoS attack:
1. Strengthen the bandwidth
2. DDoS mitigation (detecting the attack)
3. Use Content Delivery Networks (CDN)
4. Contact Internet Service Provider (ISP)


New Member
Most hosting companies now offer DDos protection like Cloudflare based servers. So you could actually find a host that has ddos protection for their servers. Seperate ddos protection for your server will cost you additional.


DDoS or Distributed Denial of services attack is an attempt to affect the availability of a targeted system, such as a website or application, to end-users. There are some techniques to protect your websites from DDoS.
Plane for scale, The two key considerations for mitigating large scale volumetric DDoS attacks are bandwidth capacity and server capacity to absorb and mitigate attacks. Make sure your hosting provider provides ample redundant Internet connectivity that allows you to handle large volumes of traffic.
Know what is normal and what is abnormal traffic, Whenever we detect elevated levels of traffic hitting a host, the very baseline is to be able only to accept as much traffic as our host can handle without affecting availability.
Reduce the attack surface area, One of the best techniques to mitigate DDoS attacks is to minimize the surface area that can be attacked thereby limiting the options for attackers and allowing you to build protections in a single place.
I hope this information helps you.


New Member
Use the following steps:

Call your ISP and change your IP address . (Sometimes simply unplugging your router for a day will change it too)
Download malware bytes (free trial) or spybot s&d. If it's important to you and to be 100% sure, factory reset your PC.
Don't Skype people you don't trust, join Team speak servers, or download anything suspicious. That's how people can obtain your IP
Use a VPN. If the game (like Mine craft servers) block vpn usage, connect to the game then switch to a VPN.


New Member
Login to your WHM .
2) Select Plugins (Home /Plugins).
3) Select the icon ‘Config Server Security & Firewall’.
4) Click on the option ‘Firewall configuration’.
5) turn on the firewall
To protect your site from a DDoS attack, you need to:
  • Install a firewall
  • Maintain an activity log
  • Implement geoblocking
  • Install a malware security scanner
You can implement these measures manually which requires technical expertise or by using different plugins. However, our MalCare security plugin covers all these measures under one roof. The plugin is easy to use and gives you access to all these features from a centralized management console.


New Member
> I wan to protect my website from ddos attackes, Any suggestions ?

I would suggest going in stages...

Initial Assessment:
The first question to ask is why anyone would feel like targeting you.
After all its either about something to do with passion or there is some gain to be had by making you unreachable.

On the passion front:
* lets say you upset someone and they know your online presence and they decide to affect your reachability.
* The question is what was the cause? how did they link the online-presence to you?

On the front of some sort of gain for the one running the attack t be had:
* Is there a financial incentive to get you offline?
* Is there a competitive incentive to get you offline?

Once you are figured out why you may be a target, the next step is to assess the likelihood of this happening.

Then consider what the impact on you would be if you got targeted. (just an annoyance? loss of sales? cannot provide the service you intend to run?)

From all of this you build your threat model.

Then you work out if you need a Mitigation Strategy. And what kind of Measures should be taken.

If its for a personal blog or website, the overall impact of downtime is likely low. The risk of getting selected for some "downtime" is probably low as well. So you probably wouldn't benefit a whole lot from the extra expense if its not included for free in your plan. (An interesting consideration is that people who are likely to suffer ddos attacks, are also likely to flock to the same types of hosting/mitigation services - based on advertisement not actual effectiveness)

For Commercial projects you have to consider how much you want to spend per month, not to suffer ddos related outages. This should be based on potential reputation loss, loss of sales, ....

Attackers Strategy:
* Are they sending large amounts of traffic attempting to overrun your network?
* Is the attacker trying to get overload your processing resources by sending requests that are cpu intensive to handle?
(ie login attempts to your gameserver, leading to a db-lookup of invalid credentials,...)
* ....

Looking at Technical strategies that where suggested so far:

- Increase Bandwidth:
Just doing "Small" increases is pretty useless. So Unless you are talking about picking up very large amounts of bandwidth and also strengthening your networks resilience and building your own solutions for traffic scrubbing then this point really isn't the solution you are looking for.
Most regular users here probably cannot do that in any meaningful way on their own.
Eventually either the amounts of traffic will overwhelm you, or the amount of packets will saturate the network equipment close-by. A lot of Datacenters/Colocation Facility may also interfere with inbound traffic if the traffic levels go over certain thresholds. (ie Auto-Null routes,...)

- CDN Services:
Depending on the billing model, this may keep you online but could turn out to be the expensive option. Also potentially adds some extra latency for users visiting your website on interactive content requiring server side processing. May also come with privacy implications,... (depending on your target market/audience).

- DDOS Scrubbing Services:
Could work for your use-case, depending on the kind of attacks you are anticipating. There are a few reputable ones around that deliver decent performance.

.... Lets address the things that i have seen posted here that will most likely not really make an impact:
* Install a firewall => doesn't help, if the "pipe"/network leading towards the firewall gets overwhelmed. Furthermore, firewalls like all of your network equipment can only handle a certain amount of packets per second. Once you start receiving more than they can handle, you run into issues.
* Geoblocking: Only really impacts your reach-ability in a best case scenario.
Realistically it won't help you much, unless you are running a large network and can drop traffic efficiently on your networks edge (and have enough bandwidth capacity to handle all the inbound traffic you have to drop). You have to realise that before you can geoblock, you first have to accept the traffic, inspect it and then discard it based on the ruleset.
* security scanner/anti-malware solution: whilst generally good practice, this does not really mitigate inbound attacks.