Caching and protecting against attacks
Types of attacks:
Synchronize/ Acknowledge floods
In a SYN flood attack, a malicious client sends a large number of SYN packets, but never sends the final ACK packets to complete the handshakes. The server is left waiting for a response to the half-open TCP connections and the idea is that the target eventually runs out of capacity to accept new TCP connections which prevents new users from connecting to the server, however the actual impact is more nuanced.
UDP Floods
Reflection attacks
Distributed Denial of Service Attack
https://aws.amazon.com/blogs/security/how-to-protect-dynamic-web-applications-against-ddos-attacks-by-using-amazon-cloudfront-and-amazon-route-53/
Protection
DNS query floods
CloudFront protection
Route 53 and CloudFront built in protection
Route 53 built in protection
Other protection mechanisms
AWS WAF
To prevent attacks based on IP address reputation, you can create rules using IP matching or use Managed Rules for AWS WAF.
Amazon's IP reputation list rule group includes rules based on Amazon's internal threat intelligence. These rules look for IP addresses that are bots, performing reconnaissance against AWS resources, or actively engaging in DDoS activities. The AWSManagedIPDDoSList rule, has been observed blocking over 90% of malicious request floods.
- automatically block IP addresses of bad actors when the number of requests received in a 5-minute sliding window exceed a threshold that you define. Offending client IP addresses will receive a 403 forbidden response (or configured block error response) and remain blocked until request rates drop below the threshold.


Comments
Post a Comment