What is a DDoS attack?
A DDoS attack (Distributed Denial of Service) aims to make a server, service or infrastructure unavailable. This type of attack consists in overwhelming the target or its surrounding infrastructure with a high number of requests sent at the same time from multiple points on the internet. This renders the service unstable, and sometimes unavailable.
As the volume of data that exists on the internet grows exponentially, DDoS attacks are becoming increasingly common. Spread of new technologies and tools availability allow even nontechnical people to create a DDoS attack and decrease the realisation cost. For as little as couple of tens of dollars one may effectively disrupt operations of even the largest institution in any part of the world.
Our anti-DDoS solution provides reliable protection against distributed denial-of-service attacks for both network and application layer. We use advanced algorithms in order to constantly monitor suspicious activity and identify potential threats. With the use of AI (Artificial Intelligence), system can detect attacking methods that have not been identified yet.
Protection activation takes usually just a few minutes and is based on altering DNS records. Once activated, all HTTP/HTTPS traffic flows through a filtering layer, which enables real-time data packets analysis and separation of non-legitimate requests from others. This protects your website by only allowing legitimate traffic through.
The filtering infrastructure is located in the EU, which allows companies to meet GDRP requirements.
Protection against most common DDoS attacks
- TCP SYN+ACK TCP FIN
- TCP RESET TCP ACK
- TCP Fragment
- UDP Flood
- Reflected ICMP & UDP ICMP Flood
- Local File Inclusions HTTP GET Flood HTTP POST Flood
- HTTPS Attacks SQL Injection
Web Application Firewall (WAF)
DDoS attacks are often paired with more harmful attacks that result in data breaches of PII (personally identifiable information) or financial information. Application layer attack is the most common type these days. Thus, each of our anti-DDoS protection plan contains Web Application Firewall (WAF).
WAF inspects incoming HTTP/HTTPS requests and server’s response to these requests. In this way, the firewall effectively protects web-based applications against such attacks as SQL Injection, XXS (Cross-Site Scripting), as well as against zero-day exploit.
Same as anti-DDoS, WAF uses machine learning for better threat detection and faster response. Machine learning algorithms are step ahead of hackers and can detect all types of attacks, even those not known before.
Choose a plan that best fits your needs
We use the best tools and technologies, to ensure the highest quality and efficiency of our services.