If the protected plans above do not fit your needs, please message us and we'll create a custom plan for you.
Refers to a security measure that safeguards websites from Distributed Denial of Service (DDoS) attacks. It involves routing incoming web traffic through a proxy server, which acts as a shield between the website and potential attackers. The reverse proxy analyzes and filters the traffic, identifying and mitigating malicious requests, thus ensuring the website remains accessible and operational during DDoS attacks.
An unlimited number of domains can be protected with our Remote DDoS Protected plans and you dont have to host your websites with us – it can be hosted with any third party. We offer a secure IP address to redirect your domain name, ensuring your server’s real IP remains hidden. Incoming traffic is redirected through our DDoS Mitigation Infrastructure, effectively blocking malicious DDoS attacks. Our web-based HTTP reverse proxy then efficiently forwards only clean traffic to your actual server where your website is hosted.
Remote DDoS protection via Worldshield Proxy is a robust solution for safeguarding websites against Distributed Denial of Service (DDoS) attacks. By utilizing a reverse proxy server, this approach enhances security and mitigates potential threats.
How it works:
Traffic Routing: The reverse proxy acts as an intermediary between clients and the web server. It receives incoming requests and forwards them to the appropriate destination.
Load Balancing: can distribute incoming traffic across multiple backend servers, ensuring optimal resource utilization and preventing overloads. This can be done by opening a support ticket with us and providing backend servers’ IP addresses.
DDoS Filtering: provides various modules and configuration options to filter and analyze incoming requests. These modules can detect and block suspicious or malicious traffic associated with DDoS attacks.
Rate Limiting: setting up rate limits to restrict the number of requests from a single IP address or within a specific time frame. This helps mitigate the impact of DDoS attacks by limiting the rate of incoming traffic.
Caching: cache static content, reducing the load on backend servers and improving response times, even during high traffic volumes caused by DDoS attacks.
SSL/TLS Termination: can handle SSL/TLS encryption and decryption, offloading this task from backend servers. This improves performance and frees up resources for handling DDoS attacks.
Logging and Monitoring: provides extensive logging and monitoring capabilities, allowing administrators to track and analyze traffic patterns, detect anomalies, and take proactive measures against potential DDoS threats.
Overall, our remote DDoS protection Proxy provides an effective and scalable solution to defend websites against DDoS attacks. It leverages our firewall’s powerful features to intelligently filter and manage incoming traffic, ensuring website availability and enhancing security posture.
Worldshield’s web application firewall (WAF) helps protect web applications against a wide range of attacks. Some common types of attacks that a WAF can help with include:
SQL Injection (SQLi): A WAF can detect and block attempts to inject malicious SQL queries into web application forms or parameters, preventing unauthorized access or manipulation of the application’s database.
Cross-Site Scripting (XSS): WAFs can identify and block malicious scripts injected into web pages, preventing attackers from executing unauthorized code on users’ browsers and stealing sensitive information.
Cross-Site Request Forgery (CSRF): WAFs can detect and block forged or unauthorized requests sent from a user’s browser, protecting against attacks that manipulate user actions or perform actions on behalf of the user without their consent.
Remote File Inclusion (RFI) and Local File Inclusion (LFI): WAFs can prevent unauthorized inclusion of remote or local files into a web application, guarding against attacks that exploit file inclusion vulnerabilities to execute arbitrary code or gain unauthorized access to files.
Distributed Denial of Service (DDoS): Some WAFs include DDoS protection mechanisms to detect and mitigate large-scale traffic floods or application-layer DDoS attacks, ensuring the availability and performance of web applications.
Brute Force Attacks: WAFs can detect and block repeated and successive login attempts or authentication requests, protecting against brute force attacks aimed at guessing passwords or gaining unauthorized access.
Application-Layer Protocol Attacks: WAFs can identify and mitigate attacks targeting specific application protocols, such as HTTP floods, Slowloris, or XML/SOAP attacks, protecting against protocol-level vulnerabilities and ensuring the integrity of the application.
Web Scraping and Data Scraping: WAFs can detect and mitigate attempts to scrape or extract sensitive data from web applications, preventing unauthorized access to valuable information.