Page 29 - index
P. 29







That suspicious-looking email with the enticing attachment might have been the access point
for the botnet virus. Perhaps it was the flashy installation prompt. Or maybe it was from that
song or movie you downloaded. The only symptom might be that your device runs a little
slower than usual. However it got there, if there’s a virus in your system, your router is likely
being used for illegal activities.

According to cyber security provider Incapsula, a good way of protecting your server is with
a cloud proxy solution, which will mask your servers’ IP addresses to prevent direct DDoS
attack. This by itself is obviously not enough, as the attackers can still send DDoS traffic
through the proxy itself.

This is why, as Incapsula experts point out, the cloud proxy itself must also function as
DDoS protection service, both by providing extra network capacity and by offering bot
filtering solution for application (layer 7) DDoS attacks, that use fake HTTP traffic.

Now that hackers have seen the success of DDoS attacks, they will continue to research
techniques for rounding up larger botnets, and subsequently orchestrating more powerful
offenses.

Be on the lookout for new methods of hacker activity, and keep track of the cyber defense
industry’s response.



About the Author

This article was written by Amanda Walters, an experienced freelance writer
and researcher. Graduating in 2009 with a 2:1 degree in creative writing and
journalism, she has gone on to enjoy a fruitful career, with an extensive
background in writing for many lifestyle and technology blogs and
magazines.





























29 Cyber Warnings E-Magazine – April 2014 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   24   25   26   27   28   29   30   31   32   33   34