In order to protect Pillars against DDOS attack, they can be “hidden” behind sentry nodes. A community member wrote some code to automate this process. It’s called “Sentrify”.
A Pillar operator needs to setup two or more Sentry Nodes, preferably in different regions and/or availability zones. Sentry nodes are publicly accessible and the Pillars are restricted to only communicate with these nodes. No outside actor can communicate directly with a Pillar once sentrified. Therefore, in order to take down a Pillar a bad actor would need to take down all the Sentry Nodes securing the Pillar.
To Sentrify your Pillar please visit the link below.