Or we can hide the real ip using something like CloudFlare. Such as an example 
http://www.zonegeek.tk/ .Wallahualam.
Sent from my BlackBerry® smartphone

-----Original Message-----
From: Harisfazillah Jamel <[email protected]>
Sender: [email protected]
Date: Wed, 22 Jun 2011 12:07:23 
To: Open Web Application Security Project (OWASP) Malaysia Local 
Chapter<[email protected]>
Reply-To: "Open Web Application Security Project \(OWASP\) Malaysia Local
        Chapter" <[email protected]>
Subject: Re: [OWASP-Malaysia] DDoS Defence Guide Released France CERT

Team,

Immediate action that we can do is to lower the TTL of the DNS.

Under Preparation step

Confirm DNS time-to-live (TTL) settings for the systems that  might be
attacked. Lower the TTLs, if necessary, to facilitate DNS  redirection
if the original IP addresses get attacked. 600 is a good  TTL value.

Why?

Cache for DNS (ISP level, users DNS cache level) can be expired much
more faster so any redirection that we do by using Domain name can be
done immediately.



On Wed, Jun 22, 2011 at 11:07 AM, Harisfazillah Jamel
<[email protected]> wrote:
> Republish for Operation Defence Malaysia.
>
> DDoS Defence Guide Released France CERT
>
> http://bit.ly/mcsrki
>
> The original page with others publication by French Cert.
>
> http://cert.societegenerale.com/fr/publications.html
>
_______________________________________________
OWASP-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.my

OWASP Malaysia Facebook
http://www.facebook.com/OWASP.Malaysia

OWASP Malaysia Twitter #owaspmy
http://www.twitter.com/owaspmy
_______________________________________________
OWASP-Malaysia mailing list
[email protected]
https://lists.owasp.org/mailman/listinfo/owasp-malaysia

OWASP Malaysia Wiki
http://www.owasp.my

OWASP Malaysia Facebook
http://www.facebook.com/OWASP.Malaysia

OWASP Malaysia Twitter #owaspmy
http://www.twitter.com/owaspmy

Reply via email to