What Is DDoS
Distributed denial-of-service (DDoS) attacks target websites and online services. The aim is to overwhelm them with more traffic than the server or network can accommodate. The goal is to render the website or service inoperable.
Types Of DDoS
Layer 3, the Network layer. Attacks are known as Smurf Attacks, ICMP Floods, and IP/ICMP Fragmentation.
Layer 4, the Transport layer. Attacks include SYN Floods, UDP Floods, and TCP Connection Exhaustion.
Layer 7, the Application layer. Mainly, HTTP-encrypted attacks
The primary way a DDoS is accomplished is through a network of remotely controlled, hacked computers or bots. These are often referred to as “zombie computers.” They form what is known as a “botnet” or network of bots. These are used to flood targeted websites, servers, and networks with more data than they can accommodate.
Anti DDoS Technology
The pre-firewall is the first component of our VAC system. It is fully managed by OVH (our upstream), and applies rules that define filters directing data packets to the Firewall Network. These rules are applicable to all OVH solutions. When a DDoS attack is launched, the pre-firewall manages part of the filtering, and sends the rest to the Firewall Network, which has customisable rules. Our pre-firewall is based on an Arista 7508R, which can reach a communication capacity of 28.8 Tbit/s. Isolation by VRF then routes the traffic through our system’s successive stages.
The Firewall Network
This is the second component of the VAC. The Firewall Network is a solution that limits exposure to attacks from the public network. It activates automatically as soon as a DDoS attack starts. You can configure it by creating up to 20 rules, which will filter packets more finely and can be adapted to fit your server’s activity. Each rule is a specific authorisation you can use to optimise protection for your service. This firewall activates automatically whenever a DDoS attack begins, and you cannot deactivate it until the attack is over. This is why it is important to keep your firewall rules up-to-date.
Shield And Armour
The Shield intervenes if an attack uses an amplification technique (DNS amp, NTP amp). Armor is the most advanced filter in our VAC, and mitigates the strongest attacks. Armor is the most advanced filter in our VAC, and intervenes in mitigating the strongest attacks.