Company Information

DDoS Protection

How does our DDoS protection work?

     Our base level protection satisfies most of our clients DDoS protection needs. This level of protection is intended for intermittent, small to medium scale DDoS attacks which do not target a specific application. Since our base level protection is shared across the network, it is provided on an as-available basis and does not offer any guaranteed protection levels. The base level protection is not intended to protect websites or servers against attacks that are sustained, large, sophisticated, or application specific.

     Our advanced level protection is powered by DDHS Guard. DDHS Guard is intended for clients who require protection against sustained, complex, and application specific DDoS attacks. It has a mitigation efficacy of up to 95-99% and can protect any service or server remotely. DDHS Guard was developed by our in-house engineers and is constantly being upgraded to stop emerging threats in their tracks. DDHS Guard is capable of handling attacks up to 10 Gbps or 1,000,000 PPS in size.How DDHS Guard Protects You From DDoS Attacks

How does a DDoS attack occur?

     A typical DDoS attack is generated from a herd of malware-infected computers that are controlled by a single operator. This herd is also known as a botnet. When a computer becomes infected by such malware, it becomes a zombie. The botnet operator has complete control of all the zombie infected computers. These herds of zombies are used to launch DDoS attacks against victim websites by flooding them with illegitimate traffic using one of many different attack methods. A botnet can contain anywhere from thousands of infected hosts to even millions. The anatomy of a typical DDoS attack is depicted below:Anatomy of a typical DDoS attack

     As mentioned before, a DDoS attack can come in many forms. Botnets are capable of launching various types of DDoS attacks including: ICMP, UDP, TCP, HTTP GET/POST, SYN, and many more. DDHS provides DDoS protection against all types of attacks up to 10 Gbps, with the ability to add additional protection capacity if necessary. A typical DDoS attack will almost certainly cause downtime on an unprotected network. This will not happen at DDoS Hosting Solutions.