Increased load on webhosting due to requests from some IPs

Started by Ronny, Oct 19, 2022, 12:47 AM

Previous topic - Next topic

Labionda

Quote from: -DM- on Oct 21, 2022, 06:39 AMI do not know how to live without claudflare
Quote from: Ali_Pro on Oct 21, 2022, 08:21 AMYou set up a CF.
It's nice when you have your hands and your head in place :)
And quite well, if you have another paid antiddos and a lot of extra money for a more powerful server.  ;D

!أطيب التمنيات
  •  

AndersonP

External attacks primarily involve bots scanning the site for vulnerabilities and sensitive areas that can be hacked to slow down operations and consume hosting resources. The increase in traffic is caused by an external scanner sending numerous POST requests to the server simultaneously.

Load surges are relatively common since network traffic fluctuates frequently. However, there's no need to panic. If changes occur too frequently, conduct a full site inspection, study the code thoroughly, and assess if any JavaScript function is hampering the work.

Checking logs may help you identify where the root of evil lies. It's also necessary to test your scripts.

If everything seems okay on the outside, it's possible that the problem lies within the site like a parasite. Begin by scanning your resource for malicious code and implement a security system. Analyze the site's loading speed, review the processing time for database requests, replace old non-optimized methods with functions, and consider using Nginx in conjunction with Apache to limit the number of requests.
  •  

upoynavanjez

If you're experiencing a sudden increase in hosting load and requests from foreign IP addresses, there are a few steps you can take to address the issue.

1. Monitor Your Traffic: Use web analytics tools or server logs to understand the origin of the increased traffic and identify any patterns or commonalities among the requests.

2. Implement Rate Limiting: Configure your server or hosting platform to enforce rate limits on incoming requests. This can help mitigate the impact of excessive traffic by limiting the number of requests from a single IP address or network within a specified time interval.

3. Consider Cloudflare: As you mentioned, connecting your domain to a service like Cloudflare can provide additional security measures, including filtering out suspicious requests based on IP addresses, URLs, or other parameters. Cloudflare can also cache content and help distribute the load across multiple servers, reducing the strain on your infrastructure.

4. Consult with Hosting Provider: Reach out to your hosting provider's support team for guidance on mitigating high load issues. They may have specific recommendations or be able to assist with implementing necessary changes at the infrastructure level.

5. Optimize Website Performance: Review your website's code, database queries, and overall architecture to identify potential bottlenecks and optimize performance. Implement caching techniques, minimize resource-intensive processes, and consider implementing content delivery networks (CDNs) to offload some of the traffic.

6. Consider Professional Help: If you're still facing difficulties, consider consulting with a professional who specializes in web security or performance optimization. They can provide a thorough analysis of your infrastructure, identify vulnerabilities, and suggest appropriate solutions tailored to your specific situation.

7. Enable Firewall Rules: Configure your server or hosting platform's firewall to block traffic from suspicious IP addresses or ranges known for malicious behavior. This can help filter out unwanted requests and mitigate the impact on your hosting load.

8. Implement CAPTCHA: Consider adding CAPTCHA verification to forms or interactive elements on your website. This can help differentiate between human and automated requests, reducing the number of potentially malicious or spammy requests.

9. Stay Updated: Keep your website's software, plugins, and frameworks up to date. Regularly patching and updating these components can help address security vulnerabilities that could be exploited by attackers.

10. Use Web Application Firewalls (WAF): Utilize a WAF solution that can inspect incoming traffic and identify and block malicious requests. This can provide an additional layer of protection against various types of attacks, including those originating from foreign IP addresses.

11. Analyze Traffic Patterns: Continuously monitor and analyze your website's traffic patterns to identify any unusual activity. Look for spikes in traffic, anomalies in the types of requests being made, or any other irregularities that could indicate potential security threats.

12. Educate Users: Promote good security practices among your website's users. Encourage them to use strong passwords, be cautious about clicking on suspicious links, and report any unusual activity they may experience while accessing your site.

13. Use IP Whitelisting: Consider implementing IP whitelisting to only allow access to your website from trusted IP addresses or networks. This can help restrict access to your site to known, authorized entities, reducing the chances of unauthorized traffic.

14. Implement Two-Factor Authentication (2FA): Add an extra layer of security by implementing 2FA for administrative accounts and any other critical areas of your website. This ensures that even if someone gains access to a password, they would still need a secondary factor (like a unique code generated on a mobile device) to log in.

15. Conduct Regular Security Audits: Perform regular security audits of your website to proactively identify vulnerabilities and address them promptly. This can involve using security scanning tools, hiring professionals for penetration testing, or conducting code reviews to ensure the security of your website.

16. Backup and Disaster Recovery Plan: Regularly back up your website's data and have a robust disaster recovery plan in place. This allows you to quickly restore your website to a previous state if it becomes compromised or experiences any issues.

17. Stay Informed: Keep up to date with the latest security threats, vulnerabilities, and best practices in the industry. Subscribe to security advisories and newsletters to stay informed about emerging threats and proactive security measures.

18. Consider Dedicated Hosting or Managed Services: If your website continues to face excessive load and security challenges, consider moving to a dedicated hosting solution or engaging a managed service provider. These options can provide additional resources, expertise, and security measures tailored to your specific needs.

19. Implement Web Application Security Headers: Configure your website to include security headers in the HTTP response. These headers can help protect against common web vulnerabilities, such as cross-site scripting (XSS) and clickjacking attacks.

20. Use Content Security Policy (CSP): Implement a content security policy to control what types of content can be loaded and executed on your website. This can help mitigate risks of malicious scripts being injected into your pages.

21. Regularly Scan for Malware: Utilize malware scanning tools or services to scan your website regularly for any signs of malware or malicious code. Promptly remove any detected threats and investigate the source of the infection.

22. Educate Yourself: Take the time to understand the common types of web attacks, such as SQL injection, cross-site scripting (XSS), and distributed denial-of-service (DDoS) attacks. This knowledge will help you better protect your website and take appropriate measures to prevent them.

23. Harden Server Configuration: Review your server configuration and ensure that it follows best practices for security. Disable unnecessary services, use secure protocols (e.g., HTTPS), and implement strong access control measures.

24. Regularly Check for Vulnerability Updates: Stay informed about security vulnerabilities in the software and frameworks you use for your website. Regularly check for updates and patches to address these vulnerabilities promptly.

25. Implement Intrusion Detection and Prevention Systems (IDS/IPS): Consider deploying IDS/IPS solutions that can monitor incoming and outgoing traffic, detect suspicious or malicious activity, and automatically block or alert you of potential threats.

26. Encrypt Sensitive Data: If your website handles sensitive user data, ensure that it is properly encrypted both in transit (using HTTPS) and at rest (using encryption technologies). This helps protect the privacy and integrity of the data stored on your servers.

27. Conduct Security Awareness Training: Educate your team and website administrators about the importance of cybersecurity and best practices to follow. Teach them about common attack vectors and how to respond to potential security incidents.

28. Implement Web Application Firewalls (WAF): Deploy a WAF solution that can analyze incoming web traffic, identify suspicious patterns, and block malicious activity. WAFs often employ rule-based systems or machine learning algorithms to detect and mitigate attacks in real-time.

29. Implement Secure Coding Practices: Train your developers to follow secure coding practices, such as input validation, output encoding, and parameterized queries. This can help prevent common vulnerabilities like SQL injection and cross-site scripting.

30. Use Strong and Unique Passwords: Encourage users and website administrators to use strong, complex passwords for their accounts. Additionally, enforce password policies that require regular updates and prohibit the reuse of old passwords.

31. Regularly Audit User Accounts: Periodically review user accounts on your website to identify and remove any dormant or suspicious accounts. This helps minimize the risk of unauthorized access.

32. Enable Log Monitoring and Analysis: Activate logging mechanisms on your server and regularly review log files for any suspicious activities. Analyzing logs can provide valuable insights into potential security breaches or abnormal behavior.

33. Implement Two-Factor Authentication (2FA) for Users: Offer 2FA as an additional security layer for user accounts on your website. This can significantly reduce the risk of unauthorized access, even if usernames and passwords are compromised.

34. Stay Up to Date with Security News: Follow reputable cybersecurity blogs, forums, or news outlets to stay informed about the latest threats, vulnerabilities, and security practices. Being proactive and aware can help you better protect your website.

35. Engage External Security Audits: Consider hiring external security experts to conduct thorough security audits of your website. Their expertise and fresh perspective can help uncover vulnerabilities that you might have missed.
  •