Page 37 - Cyber Warnings
P. 37
Furthermore, secured VPS hosting provides full access to console, which helps in eliminating
the potential malware.
In short, DDoS secured VPS hosting takes away the headache and makes use of the latest
technology to put your website in the driving seat.
7. Drop Packets from Obvious Sources of Attack
DDoS attacks have the potential to create a havoc on your business and you need to stop traffic
from false sources at any cost. Focus on using the access list at the perimeter of network to
prevent malicious activities. Furthermore, instruct the router to drop packets from IPs that are
obvious sources of attack. You can also rate limit your router to add another layer of protection.
Again, with the increasing size of online attack, this strategy will only buy time and delay the
ramping up of the threat.
8. Purchase a Dedicated Server
Purchasing a dedicated hosting server will provide you with more bandwidth, control over
security, and countless resources. With a dedicated server as your first layer of defense, you
can successfully run your online site with thousands of legitimate customers without worrying
about anything. Undoubtedly, dedicated servers are expensive, but the benefits clearly outweigh
any monetary issue you face due to lack of DDoS protection.
Our DDoS protected dedicated servers provide DDoS protection of 20 Gbps with a bandwidth of
10 terabytes. We manage 100% of the server operation, giving you room to focus on other
important business aspects.
9. Block Spoofed IP Addresses
“Things are not always what they seem; the first appearance deceives many”.
-Phaedrus
These words hold true, especially for IP address spoofing. For those of you who are new to the
word ‘spoofing’ – in simple English, it means ‘presenting the wrong facts in a decorated
manner’. Prevention of IP address forgery leads to harmful DDoS attack and you need to focus
on the following tips to stop IP address spoofing.
• Create an access control list (ACL) to deny all inbound traffic with a particular source IP.
• Focus on using reverse path forwarding (RPF) or IP verify. It works similar to an anti-
spam solution.
37 Cyber Warnings E-Magazine – March 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide