Skip to content

Latest commit

 

History

History
32 lines (29 loc) · 1.16 KB

README.md

File metadata and controls

32 lines (29 loc) · 1.16 KB

The Anti-DDoS uses behavioural analysis, traffic signatures, rate limiting, and other such techniques to identify malicious traffic per source-address.

# For debugging use iptables -v.
IPTABLES="/sbin/iptables"
IP6TABLES="/sbin/ip6tables"
MODPROBE="/sbin/modprobe"
RMMOD="/sbin/rmmod"
ARP="/usr/sbin/arp"
LOG="LOG --log-level debug --log-tcp-sequence --log-tcp-options"
LOG="$LOG --log-ip-options"
RLIMIT="-m limit --limit 3/s --limit-burst 8"
PHIGH="1024:65535"
PSSH="1000:1023"

Medium Twitter Discord