24/799,98%SLA

DDoS protection

Eliminate network resource vulnerabilities and protect yourself from financial and reputational risks

The most powerful DDoS attack in history occurred in March 2018 on the GitHub web service. According to the site’s owners, hackers tried to disable the service by crashing an attack of 1.35 Tbps. As a result, GitHub servers crashed for approximately 10 minutes.



How to recognize a DDoS attack

Inaccessibility of internal resources from the Internet

Unexpectedly low network performance.

Unavailability of one or more web services.

A sharp increase in the number of spam emails received.

Long-term denial of access to a network or other Internet services.

In 2018 the number of DDoS attacks increased by 95%



Types of DDoS attacks and their consequences

Network congestion with spurious traffic - so-called flood
A great number of zombie requests are sent to the attacked web source, which leads to a complete clog of the entire channel width or of the input router. Such an attack blocks the transmission of legitimate network traffic.
Attacks through the protocol vulnerabilities
Attacks exploit the limitations and vulnerabilities of various network protocols, causing a non-response server error.
Overflowing of the operating system or applications
The attack is aimed directly at the system itself. The attacker's goal is to force the program to exceed the limit of consumed compute capacity. As a result, the service is fully accessible, but doesn’t perform.


Most vulnerable industries



Why DDoS attacks are dangerous

Targeting:
specific services are attacked.
Totality:
aim at system overload and a complete denial of service.
Duration:
attacks can disable the service for several hours or days.

We guarantee integrated protection from DDoS attacks for your services

Website protection from DDoS

Proxying of the incoming traffic using the Stormwall filtering system. It is possible to connect protection at the L7 level of the OSI model and block the HTTP flood.

IP protection from DDoS

Filtering of all the types of malicious traffic through a GRE proxy tunnel or physically on the site. This service will allow you to block TCP and UDP packet flood.

WAF protection

Protection of web resources (personal accounts, payment systems, workflow, etc.) at the application level of the OSI model. Prevent hacker attacks, personal data collection, injection, and cross-site scripting (XSS). Fixation and blocking of the bruteforce attacks.

Send an enquiry


Your company's headquarters is located:

* Required fields
to top