HTTP Anti Flood/DoS Security Module v.1.8.2 - Detect Flooder IPs, Reduce Attack Surface against HTTP Flood Attacks
This module provides attack surface reduction enhancements against the HTTP Flood Attacks at the web application level. Massive crawling/scanning tools, HTTP Flood tools can be detected and blocked by this module via htaccess, firewall or iptables, etc. (like mod_evasive)
You can use this module by including "iosec.php" to any PHP file which wants to be protected.
You can test module here: http://www.iosec.org/test.php (demo)
Watch the Proof of Concept video: http://goo.gl/dSiAL
Read the Hakin9 IT Security Magazine Article about IOSEC http://goo.gl/1dcA9
Wordpress Plugin Page http://goo.gl/nF5nD
CHANGES v.1.8.2
- Improved Implicit Deny Mode for Banned IP(s) (without detection)
- Iptables Auto Ban Bash Script Included
- Request Cache Size Option
- Connection Limit Support
- Whitelist Support
- Reverse Proxy Support
- reCAPTCHA Support
You can use IOSEC under .NET see. http://phalanger.codeplex.com/
HTTP Anti Flood/DoS Security Module Web Site
Features
You can use this module by including "iosec.php" to any PHP file which wants to be protected.
You can test module here: http://www.iosec.org/test.php (demo)
Watch the Proof of Concept video: http://goo.gl/dSiAL
Read the Hakin9 IT Security Magazine Article about IOSEC http://goo.gl/1dcA9
Wordpress Plugin Page http://goo.gl/nF5nD
CHANGES v.1.8.2
- Improved Implicit Deny Mode for Banned IP(s) (without detection)
- Iptables Auto Ban Bash Script Included
- Request Cache Size Option
- Connection Limit Support
- Whitelist Support
- Reverse Proxy Support
- reCAPTCHA Support
You can use IOSEC under .NET see. http://phalanger.codeplex.com/
HTTP Anti Flood/DoS Security Module Web Site
Features
- This is a unique project and it is the world's first web application flood guard script.
- At web application (scripting) level you can,
- - Block proxies. (only via HTTP header)
- - Detect flooding IP addresses.
- - Slow down or restrict access for automated tools (HTTP flood, brute force tools, vulnerability scanners, etc.)
- - Save your server & backend infrastructure resources (database, cpu, ram, etc.) under an attack.
- - Restrict access permanently or temporarily for listed IP addresses in "banlist" file.
- - Notify yourself via email alerts when attacks begin.
- - Implicit deny for DoS/DDoS attacks
Source-