The Alibaba Cloud server I use, will the website be attacked?

In fact, everyone has a misunderstanding. What kind of server your platform uses has nothing to do with whether you attack or not. At present, Alibaba Cloud’s market share is still very large, accounting for about 80% of the domestic market. So far, almost every software development company uses Alibaba Cloud servers. First of all, the first reason is that Alibaba Cloud’s cloud machines are very simple to operate and easy to use. There are too many advantages. If you need discounts from Alibaba Cloud, you can contact Little Ant,

The ip belonging to the Alibaba Cloud server has a range of values.

Ali is a relatively large server provider, and the number of cloud hosting servers is relatively large.

It is possible that the attack is not aimed at you, but that this ip was used by other cloud hosts before, and then the ip was re-owned after the cloud host was decommissioned, and it happened to be used by you. So it was attacked as soon as it was rented.

If the server and website are attacked, it is recommended to check the system log of the server and the log of the website operation, analyze and determine what type of attack was received, and then which server mediates the corresponding security policy to defend.

You can also install protection software such as security dog ​​for defense. The server security dog ​​mainly protects the server from malicious attacks, including DDOS, ARP firewall, remote desktop guard, port protection, network monitoring, etc. The website security dog ​​mainly protects the security of the website on the server, including scanning for Internet horses and hanging horses, SQL injection protection, CC attack protection, resource protection, etc.

The direction of protection of the two is different. It is recommended to use in combination for more comprehensive protection.

While defending, you can check the protection log to know what type of attack the server and website are under, and then adjust the protection rules according to the type of attack, so that you can defend more effectively.

If you need to link to Xiaoyijun's protection, you can contact the following contact information at any time and be online anytime, anywhere.

Guess you like

Origin blog.csdn.net/xyyaq/article/details/124106551