"A distributed denial of service attack (DDoS) occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers."
Questions tagged [ddos]
559 questions
3
votes
6 answers
Google Analytics vs ddos
What i'm wondering is, what kind of behaviour does google analytics show when a ddos attack occurs? Any theories?

Kadir Ateşoğlu
- 47
- 1
- 2
3
votes
6 answers
Prevent AJAX flooding in Javascript
My site has a Javascript method that makes an AJAX request to add an item to cart without reloading the page and making a simple notification.
AddToCart()
However, using any Javascript console, I found you can flood this request with a simple…

Kyle Macey
- 8,074
- 2
- 38
- 78
3
votes
0 answers
Is there a way to fight back DDOS attacks with IIS on kernel level?
I am developing a system, a main key of which should be security.
So i have to consider the weakest places, where it might be broken.
Probably, the first ones are brut force and DDOS attacks.
I've read a lot of 'best practices' to fight them, and…

Mark
- 41
- 1
- 3
3
votes
1 answer
Crawling issue with loading page using Python (wait up to 5 seconds)
I am trying to crawl the webpage https://sec.report/, which seems to be protected by a certain server configuration. (I need the data for my master thesis).
I have a list of company names, which I would like to get certain identifiers (CIK) from the…

lkick
- 31
- 2
3
votes
1 answer
XXE billion laughs attack seems not to be mitigated as expected by the Sonar recommended solution to prevent XXE attacks
XXE security threat is currently no. 4 in the OWASP top ten web application security threats list, so I would expect that the Java standard XML libraries would prevent such attacks. However, when I use the Validator class in a way recommended by…

John Donn
- 1,718
- 2
- 19
- 45
3
votes
0 answers
Cloudflare blocks API request trough curl
I am trying to access an API URL using curl, which has worked perfectly on my computer. But once I moved over my website to a VPS it suddenly stopped working, due to that the API-Host is using cloudflare, and since my VPS-IP eventually looks…

Emrik Ahlström
- 95
- 6
3
votes
1 answer
How to bypass Cloudflare's DDOS protection when querying via AJAX for JSON response?
I'm querying a JSON API that runs Cloudflare, and I'm being returned HTML form Cloudflare. When I click the link, I see the wait 5 seconds page from cloudflare, but there's no JS in an AJAX request...
Can't seem to get raw JSOn from even CURL. Using…

zozotop
- 61
- 1
- 7
3
votes
1 answer
Is Azure active directory vulnerable to DoS or DDOS attacks
If I add Azure AD to a cloud architecture do I still need to add a WAF to protect against DOS/DDOS specifically?
If attacks can’t get past authentication being the premises of the question.

WiredLessInTX
- 113
- 1
- 6
3
votes
3 answers
What's an easy way to do a DDoS experiment without breaking any big rules?
I thought of buying my own website www.zzzwew.com and doing a DDoS on it, but it looks like that won't work...
So if I get a goDaddy page and try to DDoS it that would hurt GoDaddy's general service?

adelCS
- 31
- 2
3
votes
2 answers
SSL protocol is able to provide protection against SYN Flooding attack?
I was wondering if SSL protocol is able to provide any way to protect the users from a SYN Flooding (Ddos) attack.

Vin Iov
- 43
- 1
- 5
3
votes
0 answers
Is there any ways to render JSON errors instead of Cloudflare captcha (challenge page)?
Our application using both web and api, but when the users move to some locations as Sri Lanka, Russia,... the mobile application can not access our apis because Cloudflare renders html challenge page. Is the any configs on Cloudflare to render JSON…

phuocph
- 121
- 1
- 8
3
votes
1 answer
Cloudfront TTL: Setting max TTL to 0 to just get DDOS protection benefits
I've been reading the Cloudfront docs and I want to make sure that my plan is reasonable. I have a backend API structured as an EC2 HTTP server with frequently updating content (several changes per second). This is my understanding:
I shouldn't…

rampatowl
- 1,722
- 1
- 17
- 38
3
votes
3 answers
How to install mod_evasive in Amazon Linux ami
Is Amazon planning to add mov_evasive to its latest AMI?
How would I need to install mod_evasive on Amazon Linux? There are
quite a few tutorials available on the web, but I have found no
recent tutorial addressing Amazon Linux.
Are there any…

Erkin Kholmatov
- 31
- 1
- 4
3
votes
1 answer
Mitigating Slow HTTP Post Vulnerability on Tomcat 8
The third party tool we used for security test is giving Slow HTTP POST Vulnerability on Tomcat 8. We have a simple Spring Controller and JSP in the application.
Existing Tomcat connector config is below:

nasminspy
- 49
- 1
- 5
3
votes
1 answer
Is Azure WebApp automatically rate limited / DOS protected?
I'm building a service that allows to enter activation keys in a desktop application, which will then call a web service to check the key and return a license. This call does not require authorization.
The web application is running as Azure "App…

B3ret
- 597
- 5
- 19