ECS anti mining
"cloud" is a metaphor of the Internet. "Cloud computing" is to use the Internet to access applications, data, or services that are stored or run on remote servers
the cloud is also hierarchical. Any company that provides its services on the Internet can be called a cloud computing company. According to NIST's authoritative definition, cloud computing has SPI, namely SaaS, PAAS and IAAs
Infrastructure - as-a-service,
platform - as-a-service,
software - as-a-service
infrastructure is at the bottom, platform is in the middle, and software is at the top. Other "soft" layers can be added on top of these layers.
What kind of configuration is this? Processing power is weak, memory is small, disk is very small (disk IO is still very beautiful, sorry, I still don't have the impulse to make fun of it), bandwidth is small (the maximum download speed is 120KB / s). It doesn't sound like it's going to work. Not really, but its advantages:
no electricity, 24 * 365 online. Even the smallest computer unit, blackberry pie, needs 5W
Last of all, I won't tell their ordinary people easily. Well, the uplink bandwidth of Alibaba cloud is not limited (to be exact, it is a very loose limit independent of the downlink bandwidth). What does that mean? It means that the download speed is very fast1. Different supply and deployment times:
virtual hosts - days to weeks. Cloud server - instant, can be completed in a few minutes, can be deployed with one click, can also install the operating system
2, different security and reliability
virtual host - General: high failure rate of renting white card server, basically no ARP, Trojan horse and DDoS prevention ability, basically no standby machine and data backup service
cloud server - high: built in ARP prevention, large-scale improvement of DDoS anti attack capability; Share the performance and reliability of brand enterprise server and hardware virtualization, with built-in ha; Provide backup, snapshot, data backup and other fast recovery measures
features of cloud server:
1. Elastic expansion, upgradable configuration and pay on demand
2. Simple and efficient, no need to purchase machines in advance, ready to use, rapid business deployment
3. Independent operating system, isolation of hardware resources + exclusive bandwidth
4. Centralized remote management platform + multi-level business backup
characteristics of cloud virtual host:
1. The number of site connections increases linearly with the increase of node servers, breaking through the limit of the number of single site connections
When the load of a node is too high, the cluster will automatically spread the excessive load to other nodes, which can effectively resist the attack of hackers3 when a site on a node cannot be accessed, the access of the site will be automatically transferred to the same site of the next node, thus effectively avoiding the occurrence of single point of failure
if you want to do defense, you can buy cloud knight, and ECS comes with cloud shield, which can prevent CC attacks.
The security settings of the cloud server mainly include the following important aspects:
1. The first is the user management of the server. Many attacks and crackdowns are aimed at the remote login of the system. After all, after getting the login user, you can enter the system for operation, so the first thing to do is to prohibit the remote login of the root super user
2. Change the default port of SSH to other uncommon ports. You may not know that our server is actually being scanned by many scanning tools every day, especially for the SSH default port 22 of Linux server. After the scanning tool scans port 22, it may try to crack and log in. Modifying the default port of SSH can rece the probability of scanning and violent login. In addition, you can also use programs such as fail2ban to prevent SSH from being brutally cracked. The principle is to disable the login of that IP after the number of failed login attempts
3. SSH is changed to login with a key, so you don't have to worry about brute force cracking, because the other party can't have your key, which is much safer than password login
Be sure to regularly check and upgrade your website programs and related components, and timely repair those major known vulnerabilities. There are also many crawler robots on the Internet scanning various websites every day, trying to find system vulnerabilities. Even if you have done a good job in the server user rights management and login protection, it is still possible for you to be hacked in the website program5. In addition, if multiple website systems (blog + enterprise official website) are running on < EM > cloud server < / EM >. I recommend using the docker container to isolate the running environment and run each program in a separate container, so that even if one of the website programs on the server is cracked and intruded, it will be limited in the intruded container and will not affect other containers or the system itself
the ECS host can be understood as a server, which can log in to the host remotely and build its own environment.