What Is DDoS

Distributed denial-of-service (DDoS) attacks target websites and online services. The aim is to overwhelm them with more traffic than the server or network can accommodate. The goal is to render the website or service inoperable.

Types Of DDoS

Layer 3, the Network layer. Attacks are known as Smurf Attacks, ICMP Floods, and IP/ICMP Fragmentation.
Layer 4, the Transport layer. Attacks include SYN Floods, UDP Floods, and TCP Connection Exhaustion.
Layer 7, the Application layer. Mainly, HTTP-encrypted attacks

DDoS Botnets

The primary way a DDoS is accomplished is through a network of remotely controlled, hacked computers or bots. These are often referred to as “zombie computers.” They form what is known as a “botnet” or network of bots. These are used to flood targeted websites, servers, and networks with more data than they can accommodate.

Keep your infrastructures protected against distributed denial-of-service attacks.

Port443 Cloud Hosting offers the most powerful anti-DDoS solution on the market.

It provides your services with round-the-clock protection against all types of DDoS attack, without any limitations in terms of volume or duration.

Anti DDoS Technology

The pre-firewall

The pre-firewall is the first component of our VAC system. It is fully managed by OVH (our upstream), and applies rules that define filters directing data packets to the Firewall Network. These rules are applicable to all OVH solutions. When a DDoS attack is launched, the pre-firewall manages part of the filtering, and sends the rest to the Firewall Network, which has customisable rules. Our pre-firewall is based on an Arista 7508R, which can reach a communication capacity of 28.8 Tbit/s. Isolation by VRF then routes the traffic through our system’s successive stages.

The Firewall Network

This is the second component of the VAC. The Firewall Network is a solution that limits exposure to attacks from the public network. It activates automatically as soon as a DDoS attack starts. You can configure it by creating up to 20 rules, which will filter packets more finely and can be adapted to fit your server’s activity. Each rule is a specific authorisation you can use to optimise protection for your service. This firewall activates automatically whenever a DDoS attack begins, and you cannot deactivate it until the attack is over. This is why it is important to keep your firewall rules up-to-date.

Shield And Armour

The Shield intervenes if an attack uses an amplification technique (DNS amp, NTP amp). Armor is the most advanced filter in our VAC, and mitigates the strongest attacks. Armor is the most advanced filter in our VAC, and intervenes in mitigating the strongest attacks.

Translate »

Enjoy this blog? Please spread the word :)