About UsBlog

DDoS Protection

DDoS Protection

A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

In a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source.

A DoS or DDoS attack is analogous to a group of people crowding the entry door of a shop, making it hard for legitimate customers to enter, disrupting trade.

Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks or credit card payment gateways. Revenge, blackmail and activism can motivate these attacks.

The most popular products in category DDoS Protection All category products

Check Point Intrusion Prevention System Software Blade
2
20
Imperva Incapsula
4
1
F5 BIG-IP DNS (formerly Global Traffic Manager - GTM)
12
5
F5 BIG-IP DNS, BIG-IP Local Traffic Manager from SecureData
12
13
Flowmon DDOS PROTECTION FOR BUSINESS CRITICAL SYSTEMS
8
4
A10 THUNDER®TPS
11
12
Allot Communications Secure Service Gateway
18
19
Palantir Foundry
17
0
Pluribus One Attack Prophecy
3
16
Pradeo Security Systems Mobile Threat Defense
10
15
Preempt Platform
15
12
Pwnie Express Pwn Pulse
3
9

Suppliers DDoS Protection

Amazon Web Services
ARE...
  • ARE
  • AUS
  • BHR
  • BRA
  • CAN
  • CHE
  • CHN
  • DEU
  • ESP
  • FRA
  • GBR
  • IDN
  • IRL
  • ISR
  • IND
  • ITA
  • JPN
  • KOR
  • NZL
  • SWE
  • SGP
  • THA
  • USA
Softprom (supplier)
ARM...
  • ARM
  • AUT
  • GEO
  • KAZ
  • MDA
  • UKR
Cloudflare
AUS...
  • AUS
  • BEL
  • CHN
  • DEU
  • FRA
  • GBR
  • JPN
  • PRT
  • SGP
  • USA
ANYSOFT
UKR...
  • UKR
  • USA
AlgoSec
AUS...
  • AUS
  • DEU
  • FRA
  • GBR
  • ISR
  • IND
  • SGP
  • USA
Anomali
ARE...
  • ARE
  • GBR
  • JPN
  • SGP
  • USA
Cequence Security
AUT...
  • AUT
  • CHE
  • DEU
  • FRA
  • GBR
  • IND
  • USA

Vendors DDoS Protection

Amazon Web Services
ARE...
  • ARE
  • AUS
  • BHR
  • BRA
  • CAN
  • CHE
  • CHN
  • DEU
  • ESP
  • FRA
  • GBR
  • IDN
  • IRL
  • ISR
  • IND
  • ITA
  • JPN
  • KOR
  • NZL
  • SWE
  • SGP
  • THA
  • USA
Barracuda Networks
AUT...
  • AUT
  • AUS
  • BEL
  • CAN
  • CHE
  • CHN
  • DEU
  • FRA
  • GBR
  • IRL
  • ISR
  • IND
  • ITA
  • JPN
  • LIE
  • LKA
  • LUX
  • MYS
  • NPL
  • NZL
  • PRT
  • SGP
  • USA
Cloudflare
AUS...
  • AUS
  • BEL
  • CHN
  • DEU
  • FRA
  • GBR
  • JPN
  • PRT
  • SGP
  • USA
Fenror7
DEU...
  • DEU
  • ISR
  • USA
AlgoSec
AUS...
  • AUS
  • DEU
  • FRA
  • GBR
  • ISR
  • IND
  • SGP
  • USA
Anomali
ARE...
  • ARE
  • GBR
  • JPN
  • SGP
  • USA
Cequence Security
AUT...
  • AUT
  • CHE
  • DEU
  • FRA
  • GBR
  • IND
  • USA
VMRay
All countries

F.A.Q. about DDoS Protection

What are the Different Types of DDoS Attacks?

Distributed Denial of Service attacks vary significantly, and there are thousands of different ways an attack can be carried out (attack vectors), but an attack vector will generally fall into one of three broad categories:

Volumetric Attacks:

Volumetric attacks attempt to consume the bandwidth either within the target network/service or between the target network/service and the rest of the Internet. These attacks are simply about causing congestion.

TCP State-Exhaustion Attacks:

TCP State-Exhaustion attacks attempt to consume the connection state tables which are present in many infrastructure components such as load-balancers, firewalls and the application servers themselves. Even high capacity devices capable of maintaining state on millions of connections can be taken down by these attacks.

Application Layer Attacks:

Application Layer attacks target some aspect of an application or service at Layer-7. These are the deadliest kind of attacks as they can be very effective with as few as one attacking machine generating a low traffic rate (this makes these attacks very difficult to proactively detect and mitigate). Application layer attacks have come to prevalence over the past three or four years and simple application layer flood attacks (HTTP GET flood etc.) have been some of the most common denials of service attacks seen in the wild.

Materials