Computer: Huawei MateBook
System: Windows 10
Software: ddos
1, you can use tools such as Inexpress, Express, Forwarding, etc. to filter unnecessary services and ports, that is, to filter fake IPs on the Router to filter fake IP.
2, through the DDOS hardware firewall cleaning and filtering of abnormal traffic, the use of top technology can accurately determine whether the external access traffic is normal, and further abnormal traffic will be prohibited filtering.
3. Distributed cluster defense is characterized by the configuration of multiple IP addresses in each node server (load balancing), and each node can withstand DDOS attacks of not less than 10G.
4, the use of cloud DDoS cleaning, the user pays on demand, scalable and flexible, but also based on big data to analyze and predict attacks, while free upgrade.