Page 39 - Cyber Warnings
P. 39
12. Use Proxy Protection
Proxy protection provides an extra layer of DDoS protection for any website and keeps your
website safe from complex cyber threats. Our remote DDoS proxy protection hides your real IP
from hackers and sends proxy traffic through their mitigation network. The best part is that the
entire process occurs without the visitors realizing it. Furthermore, remote proxy protection
increases the security and performance of HTTP applications. It’s a must for any business
looking to create an impact in the online world.
13. Set up RST Cookies
RST cookies are a strong defense against the DDoS because the server sends incorrect ACK +
SYN to the client and then the client forwards a packet telling the server about the potential
error. Therefore, it prevents the business from potential attack.
14. Filter UDP Traffic With Remote Black Holing
Filtering the UDP traffic with remote black holing can effectively stop undesirable traffic to enter
a protected network. These remote black holes are areas where the traffic is forwarded and
then dropped. And, when an attack is detected it drops all the traffic based on the IP address
and the destination. Here are the three steps to set it up:
• Prepare a null route
• Prepare a route map
• Generate a victim route on the management router
Learn more about the various types of DDoS attacks and contact us to see which type of
hosting is right for you.
About The Author
Todd Reagor is the Founder and CEO of RivalHost. He is the only employee
as his support team is outsourced. Todd lives in Edmond Oklahoma with
family.
Todd can be reached online at [email protected], and at our company
website: https://www.rivalhost.com/
39 Cyber Warnings E-Magazine – March 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide