You can use the following commands on a Linux server to determine if your dedicated server is being DDOS attacked.

# netstat -anp |grep ‘tcp\|udp’ | awk ‘{print $5}’ | cut -d: -f1 | sort | uniq -c | sort –n

This command will show you the list of IP’s which have logged in is maximum number of connections to your server.

DDOS becomes more complex as attackers use fewer connections with more number of attacking IP’s.In such cases, you should get less number of connections even when your server is under ddos. One important thing that you should check is the number of active connections that your server currently has.For that execute the following command:
# netstat -n | grep :80 |wc –l

The above command will show the active connections that are open to your server.

You can also fire the following command :
# netstat -n | grep :80 | grep SYN |wc –l

Result of active connections from the first command will vary but if it shows connections more than 500, then you will be definitely having problems. If the result after you fire second command is 100 or above then you are having problems with sync attack.

Once you get an idea of the ip attacking your server, you can easily block it.

Fire the following command to block that ip or any other specific ip:

# route add ipaddress reject

Once you block a paricular IP on the server, you can even crosscheck if the IP is blocked or not

by using the following command:

# route -n |grep IPaddress

You can also block a IP with iptables on the server by using the following command.

# iptables -A INPUT 1 -s IPADRESS -j DROP/REJECT

# service iptables restart

# service iptables save

After firing the above command, KILL all httpd connection and than restart httpd service by

using following command:

# killall -KILL httpd

# service httpd startssl

Leave a Reply

Your email address will not be published. Required fields are marked *