Do you offer for DDoS protection in Linux shared hosting?

We have implemented anti-DDoS systems in our main hardware nodes, which detect and mitigate attacks between 1 Gbps and 3 Gbps.

What is a DDoS attack?

DDoS stands for Denial of Service attack. A malicious attempt impacts a website's and application's availability.

In a DDoS attack, the attacker sends many requests to the server IP address to prevent users from accessing connected online services and sites.

What is DDoS Protection?

It is a process to protect the targeted system or network from a distributed denial of service attack.

Which type of DDoS attacks can be stopped with our Linux Shared Environment?

Buffer overflow attacks: In a buffer overflow attack, the attacker consumes all the available resources, such as hard disk, memory, and CPU, resulting in system crashes, slowness, and other hurtful server behaviour.

Flood attacks: In a flood attack, the attacker sends a large volume of packets or requests to overwhelm the target system, which results in a DDoS attack.

ICMP Flood

ICMP (ping) flood is one of the most common Denials of Service attacks. With this attack, the attacker makes the victim's system inaccessible by overwhelming it with ICMP echo requests.

UDP Flood: In the UDP flood, the attacker sends many requests/packets to the random ports on the target server. The main objective of this attack is to flood random ports on a giver remote server.

Was this answer helpful?

« Back