简体   繁体   中英

Is IIS dynamic IP restriction adequate to prevent denial of service attack?

I've implemented IIS dynamic IP restriction, I am concerned that it may not be enough. For example, if someone was to send many requests from a huge list of various proxy Ips they could in theory get through the the safety mechanism?

Is there anything else I should consider doing in IIS or .Net Mvc?

For any still wondering, here is a MS Blog covering quite a bit - it is focused on Azure but many of the points are still applicable to IIS in a non-cloud environment. security-guidelines-to-detect-and-prevent-dos-attacks-targeting-iisazure-web-role-paas

The technical post webpages of this site follow the CC BY-SA 4.0 protocol. If you need to reprint, please indicate the site URL or the original address.Any question please contact:yoyou2525@163.com.

 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM