Free DDoS protection

Anti-DDoS: a way to protect against DDoS attacks


Principles of DDoS-attacks

The chances of becoming a target of DDoS attack are large and the attacks are numerous. The ultimate goal of a DDoS attack is a non-functional server, service or infrastructure. This is done by overloading the server's bandwidth or monopolizing its resources to the point of exhaustion. During a DDoS attack, multiple requests are sent simultaneously from several points over the Internet. The intensity of such a "cross fire" makes the service unstable or, even worse, unavailable.


Goals and types of attacks

There are three ways to make your site, server or infrastructure inaccessible:

  • Bandwidth: this type of attack is the oversaturation of the server's network bandwidth, which makes it unavailable
  • Resources: this type of attack is the exhaustion of the machine's resources, which makes it incapable of responding to legitimate requests
  • Using software errors:This method is also known as "exploitation." This kind of attack is more focused on specific software errors than on making the machine inaccessible or controlling it.

What we offer to protect your services

To protect your servers and services from attacks, Unihost offers an attack suppression solution based on VAC technology - an exclusive combination of technologies for:

  • Analyze all high-speed packets in real time
  • Dispensing incoming server traffic
  • Suppressing an attack means eliminating all illegitimate IP packets, while allowing all legitimate to pass on.

Four stages of DDoS attack management:

The server is in working order - no attack occurs.

Internet services are used and work without problems. Traffic passes through the backbone of your network and falls into the data center. Then it is processed by the server, which sends the responses back through the Internet.


Start DDoS attack

The attack is launched via the Internet and spreads to the backbone. Given the excess capacity of the trunk bandwidth, the attack will not result in blocking the communication channel. The attack will reach the server, which will start processing the first spurious requests. At the same time, traffic analysis will show that the attack is currently underway and the attack suppression procedure should be started.


Suppress attack

Within 15 - 120 seconds after launching the attack, the attack suppression function is activated. Traffic arriving at your server is filtered using 3 VACs with a total suppression power of 480 Gbps (3 x 160 Gbps) located in three Unihost data centers. The attack is blocked without any restrictions on duration and size and without any restrictions whatsoever. Legitimate traffic passes through VAC to reach the server. The server responds directly, without going through VAC again. This process is called automatic suppression


Completion of the attack

Undoubtedly, DDoS attack is an expensive pleasure and especially expensive when it is ineffective. After a certain amount of time, the attack will end. Automatic suppression continues to operate for 26 hours after the attack is over. This means that any other attack that appears within a few minutes, a few hours or 24 hours will be blocked. After 26 hours, automatic suppression will be disabled, however, it will still be ready to resume operation when a new attack is detected.


Advantages of protection against DDoS attacks Unihost


Automatic and fast protection against DDoS attacks

Automatic configuration and management at the DC level provides immediate protection against DDoS attacks at the application level. The service also analyzes the features of the attack and provides its own recommendations for reducing DDoS.


Proactive detection and elimination of DDoS attacks

Unihost automates the detection of DDoS attacks and prevents their harmful impact even before there is a disruption to service performance. The functioning of the Unihost system has practically no effect on the operation of the corporate network and the work of users. Thus, Unihost reduces the burden on the security company.


Virtual environment support

Unihost also supports protection in a virtual environment, supporting VMware, Hyper-V and KVM hypervisors. This hybrid solution that uses the Arbor cloud to improve accuracy and speed of operation can protect your virtual machines from attacks to L7 level.


A complete set of tools to prevent DDoS attacks

Unihost includes advanced protection against DDoS or countermeasures, which have proven effective in the largest and most complex network environments in the world.


Automated security database updates

Automated security database updates...


Enhanced protection against incoming and outgoing traffic threats

Companies need a reliable way to prevent internal systems from being hacked. Unihost applies a global threat detection system to block incoming and outgoing threats by evaluating the reputation of the domain and IP addresses.