About us

Quality oriented, customer-oriented, hardworking, pragmatic and innovative

<Return to the public list of news

What is ECS? How to select ECS effectively avoids server black holes?

Release time: 2022-02-09 16:36:01
What is a black hole? What should I do when a virtual machine is attacked by DDOS and enters a super black hole? 1: What is called "super black hole"? A super black hole means that when the total traffic of hacker attacks on the network server exceeds the threshold of the super black hole in the host room, cloud computing technology providers block the external Internet browsing of the network server. After the network server enters the super black hole for a period of time, if the system software detects that the total attack traffic is terminated, the super black hole will be automatically unblocked.

2. What should we do when we enter the "super black hole"? Because the super black hole is a service item that various cloud computing technology service providers purchase from operators (China Unicom, Telecom Network, and Mobile). Operators have strict restrictions on the time and frequency of eliminating the super black hole. It is impossible to manually eliminate the situation of the super black hole. We must patiently wait for the system software to be fully automatically unblocked.

3. Why must "super black hole" countermeasure DDoS attacks not only harm victims, but also seriously harm all cloud networks. And the DDoS defense must cost, and the larger cost is the network bandwidth cost. Network bandwidth is purchased by cloud computing technology service providers from telecom networks, China Unicom, mobile and other operators. It is not easy for operators to clear the total traffic of DDoS attacks when estimating the cost of network bandwidth, but they just immediately deduct the cost of network bandwidth from the cloud computing technology service provider. Cloud computing technology fellow countrymen will try their best to defend customers from DDoS attacks completely free of charge under the condition of cost management. However, when the total attack traffic exceeds the threshold, cloud computing technology service providers will block the total traffic of hacker attack IP and reduce the network bandwidth cost of cloud computing technology service providers.

4: How long must it take for a super black hole to rise automatically? The default delay time of a super black hole set by a general service provider is 2.5 hours. During the period of a super black hole, it is not compatible with unsealing. The specific delay time of the super black hole depends on the attack situation, which varies from 30 minutes to 24 hours. The delay time of the super black hole is endangered by the following factors: whether the attack is repeated. If the attack is repeated, the time of the super black hole will increase, and the time of the super black hole will be measured again from the increased time. Is the attack frequent? If the customer is attacked for the first time, the super black hole time will be automatically reduced; Conversely, customers who are often attacked by hackers are more likely to be attacked continuously, and the super black hole time will increase automatically. Plan solution: use your three-dimensional protection system to hide the IP address of the real network server, and each connection point is a tunneling machine that will become a network server.

/template/Home/Zkeys/PC/Static