DDoS Protection

DDoS Attack Protection & Mitigation

Innovative and high-efficient DDoS protection, build with cutting edge technologies of next generation.

Contact us

Global network with multiple scrubbing centers and 12+ Tbps edge capacity.

Distributed globally stateful firewall with reverse proxy enabled (patented in 2022).

Easy to configure and manage the filtration rules.

We Provide DDoS Protection For:

DDoS Network Protection

We provide DDoS network protection through a BGP connection - standard Ethernet uplink, GRE tunnel or IX.

DDoS Server Protection

We provide DDoS server protection - virtual, dedicated and collocated, that are in our network.

DDoS Website Protection

We provide DDoS protection for websites, applications and services that are in our network.

Application Layer Filtering

Application layer filtering is based on protocol specifications as laid out in RFCs. It refers to the process of examining and controlling network traffic based on the specific protocols used in the application layer of the OSI model.

This can include protocols such as HTTP, FTP, and DNS, among others. The specifications for these protocols are laid out in Request for Comments (RFC) documents, which are published by the Internet Engineering Task Force (IETF).

How do we Provide DDoS Protection?

In Our Network

  • We provide free DDoS mitigation to all our clients (cloud and dedicated servers).
  • If needed, more clean traffic capacity can be provided after ordering the relevant DDoS service packet.
  • If you need to protect your network, server, application or website, join our network.

Other Networks

  • BGP connection over standard Ethernet uplink (cross-connect) that has in-line DDoS filters.
  • BGP connection over GRE tunnel established over public Internet to a closest scrubbing center.
  • BGP connection over IX - private session when supported.

Contact Us

If you need more information or would like to receive a personalized offer, contact us using the contact form below:

Frequently Asked Questions

What is a DDoS attack?

DDoS is an abbreviation for Distributed Denial of Service. A DDoS attack aims to block users' access to a network, server or application. The attack can be done by exhausting resources or by exploiting a flaw in the software. They are used to extort, cause damage, harm reputation, deter customers, lose trust, and quite often to divert attention while another attack is being carried out in parallel. Most often, popular web servers are attacked with the aim of preventing them from fulfilling requests from the Internet. According to the Internet Architecture Board, this action is a computer crime that violates Internet ethics.

Typically, DDoS attacks are huge and require a large network capacity to be filtered. Our customers benefit from a global Anycast network where more than 20 scrubbing centers with 12 Tbps network edge capacity are interconnected worldwide and have a direct connection to 23+ IXs.

What is DDoS protection?

DDoS Protection aims to protect networks, servers, online business owners, websites and applications from DDoS attacks by tracking network activity to protected resources and blocking illegal traffic before it reaches them. For our customers' DDoS protection, we use scalable and high-efficient cloud-based technology with low latency and custom filters.

How are DDoS attacks carried out?

DDoS are performed relatively easily and at an affordable price, which is why their popularity is increasing. They are implemented by malicious persons through infected devices - computers, laptops, etc. or with breaches in the security of other devices on the Internet - the so-called Botnets.

Types of DDoS attacks

DDoS attacks vary in volume, frequency and complexity. They aim to limit the operation of a server:

  • Internet Control Message Protocol (ICMP) flood
  • (S)SYN flood
  • Teardrop attacks< /li>
  • Peer-to-peer attacks
  • Asymmetry of resource utilization in starvation attacks
  • Permanent denial-of-service attacks
  • Application-level floods
  • Nuke
  • HTTP POST DDOS attack
  • R-U-Dead-Yet? (RUDY)
  • Slow Read attack
  • Reflected/ Spoofed attack
  • Telephony denial-of-service
  • Denial-of-service Level II
  • Advanced Persistent DoS (APDoS)

How to be protected from DDoS attacks?

To be protected from DDoS attacks you need to use DDoS protection. Check out our AI-based DDoS protection in a global Anycast network with high performance and low latency.