Page 39 - Cyber Warnings
P. 39







12. Use Proxy Protection


Proxy protection provides an extra layer of DDoS protection for any website and keeps your
website safe from complex cyber threats. Our remote DDoS proxy protection hides your real IP
from hackers and sends proxy traffic through their mitigation network. The best part is that the
entire process occurs without the visitors realizing it. Furthermore, remote proxy protection
increases the security and performance of HTTP applications. It’s a must for any business
looking to create an impact in the online world.

13. Set up RST Cookies


RST cookies are a strong defense against the DDoS because the server sends incorrect ACK +
SYN to the client and then the client forwards a packet telling the server about the potential
error. Therefore, it prevents the business from potential attack.



14. Filter UDP Traffic With Remote Black Holing


Filtering the UDP traffic with remote black holing can effectively stop undesirable traffic to enter
a protected network. These remote black holes are areas where the traffic is forwarded and
then dropped. And, when an attack is detected it drops all the traffic based on the IP address
and the destination. Here are the three steps to set it up:


• Prepare a null route
• Prepare a route map
• Generate a victim route on the management router

Learn more about the various types of DDoS attacks and contact us to see which type of
hosting is right for you.



About The Author

Todd Reagor is the Founder and CEO of RivalHost. He is the only employee
as his support team is outsourced. Todd lives in Edmond Oklahoma with
family.


Todd can be reached online at [email protected], and at our company
website: https://www.rivalhost.com/







39 Cyber Warnings E-Magazine – March 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   34   35   36   37   38   39   40   41   42   43   44