We protect our network very effectively against DDoS attacks by using our own detection software and filters, as well as Arbor & Path. The protection automatically detects and filters "bad traffic" and protects IP addresses from DDoS attacks.
If you want to protect a website (HTTP or HTTPS) against DDoS attacks, we additionally recommend the use of Layer 7 Protection for higher efficiency. A DDoS attack can be detected and filtered much faster with Layer 7 Protection. When using SSL, it makes sense to store the certificate in the firewall software.
During an attack, the server remains accessible and you can use the services normally. Non-relevant ports are blocked as long as the attack persists, e.g. icmp for ping.
Arbor Routed is designed to stop DDoS attacks in the cloud, before they reach your applications, data centers, and infrastructure. Network traffic is redirected through Arbor scrubbing centers by making a simple border gateway protocol (BGP) route advertisement change. Arbor offers two deployment options ― always-on is ready to mitigate malicious traffic at all times, and on-demand allows you to redirect traffic when you’re under attack.
Arbor Routed is built on a DDoS mitigation platform with 18 global scrubbing centers, closer to users and attackers to minimize performance latency and improve network resiliency.Traffic is routed through the closest available scrubbing center, and proactive mitigation controls are architected to drop attacks instantly. Arbor SOC experts analyze the remaining DDoS traffic to quickly and efficiently apply the most appropriate mitigation for every attack vector.
Clean traffic is then forwarded to your applications and data centers, and outbound traffic returned directly to users.
All important standard ports remain accessible during a DDoS attack and are filtered by the protection.
We work with several anti-DDoS solutions, one of which is Arbor, and in order to provide efficient solutions we have purchased a full tolerance solution.
List of games and applications / Games:
Grand Theft Auto 5 or RAGE-MP, Last Chaos, Knight Online, Arma III, Half-Life, Team Fortress Classic, Counter-Strike 1.6, Counter-Strike : Source, Half-Life Deathmatch Classic, Half-Life 2, Half-Life 2 : Deathmatch, Day of Defeat, Day of Defeat : Source, Left 4 Dead, Left 4 Dead 2, Team Fortress 2, Counter-Strike : Global Offensive, Garry's Mod, Grand Theft Auto San Andreas Multiplayer SA : MP, Multi Theft Auto San Andreas MTA : SA, Minecraft Pocket Edition, Minecraft, ARK : Survival Evolved, RUST, TeamSpeak, Mumble.
There are different types of DDoS (Distributed Denial of Service) attacks. Basically, a DDoS is a "denial of service" that is deliberately caused by a large number of requests and thus leads to an overload of the data network or the server.
DDoS attacks can target different layers (see ISO/OSI layer model). Compared to earlier versions, current DDoS attacks often target the top layer (Layer 7). Layer 7 is the application layer and serves to provide functions for the applications and is responsible for data input and output.
Layer 7 attacks specifically target Layer 7 protocols such as Telnet, FTP, NNTP, HTTP or SMTP. Compared to other DDoS attacks, Layer 7 attacks require far less bandwidth and packets to disrupt services. A low-level protocol attack such as SYN flood requires a huge number of packets to perform an effective DDoS attack, while a Layer 7 attack requires only a limited number of packets to perform a large DDoS attack.
The most common Layer-7 attack is HTTP flooding. Here, an HTTP request is sent to the affected server and uses considerable resources, and although the number of packets is limited, they fully utilize all server resources and lead to a denial of service.
Layer 7 protection is activated by us at your request, and we also deposit the certificate in the firewall software.