We have implemented anti-DDoS systems in our main hardware nodes, which detect and mitigate DDoS attacks between 1 Gbps to 3 Gbps.
What is a DDoS attack?
DDoS stands for Denial of Service attack. A malicious attempt impacts a website's and application's availability.
In a DDoS attack, the attacker sends many requests to the server IP address to prevent users from accessing connected online services and sites.
What is DDoS Protection?
It is a process to protect the targeted system or network from a distributed denial of service attack.
Which type of DDoS attacks can be stopped with our Linux Shared Environment?
Buffer overflow attacks: In a buffer overflow attack, the attacker consumes all the available resources such as hard disk, memory, and CPU, resulting in system crashes, slowness, and other hurtful server behavior.
Flood attacks: In a flood attack, the attacker sends a large volume of packets or requests to overwhelm the target system, which results in a DDoS attack.
ICMP Flood
ICMP (ping) flood is one of the most common Denials of Service attacks. With this attack, the attacker makes the victim's system inaccessible by overwhelming it with ICMP echo requests.
UDP Flood: In the UDP flood, the attacker sends many requests/packets to the random ports on the target server. The main objective of this attack is to flood random ports on a giver remote server.