Anti-DDoS: a way to protect against DDoS attacks
The chances of becoming a target of DDoS attack are large and the attacks are numerous. The ultimate goal of a DDoS attack is a non-functional server, service or infrastructure. This is done by overloading the server's bandwidth or monopolizing its resources to the point of exhaustion. During a DDoS attack, multiple requests are sent simultaneously from several points over the Internet. The intensity of such a "cross fire" makes the service unstable or, even worse, unavailable.
There are three ways to make your site, server or infrastructure inaccessible:
To protect your servers and services from attacks, Unihost offers an attack suppression solution based on VAC technology - an exclusive combination of technologies for:
Internet services are used and work without problems. Traffic passes through the backbone of your network and falls into the data center. Then it is processed by the server, which sends the responses back through the Internet.
The attack is launched via the Internet and spreads to the backbone. Given the excess capacity of the trunk bandwidth, the attack will not result in blocking the communication channel. The attack will reach the server, which will start processing the first spurious requests. At the same time, traffic analysis will show that the attack is currently underway and the attack suppression procedure should be started.
Within 15 - 120 seconds after launching the attack, the attack suppression function is activated. Traffic arriving at your server is filtered using 3 VACs with a total suppression power of 480 Gbps (3 x 160 Gbps) located in three Unihost data centers. The attack is blocked without any restrictions on duration and size and without any restrictions whatsoever. Legitimate traffic passes through VAC to reach the server. The server responds directly, without going through VAC again. This process is called automatic suppression
Undoubtedly, DDoS attack is an expensive pleasure and especially expensive when it is ineffective. After a certain amount of time, the attack will end. Automatic suppression continues to operate for 26 hours after the attack is over. This means that any other attack that appears within a few minutes, a few hours or 24 hours will be blocked. After 26 hours, automatic suppression will be disabled, however, it will still be ready to resume operation when a new attack is detected.
Automatic configuration and management at the DC level provides immediate protection against DDoS attacks at the application level. The service also analyzes the features of the attack and provides its own recommendations for reducing DDoS.
Unihost automates the detection of DDoS attacks and prevents their harmful impact even before there is a disruption to service performance. The functioning of the Unihost system has practically no effect on the operation of the corporate network and the work of users. Thus, Unihost reduces the burden on the security company.
Unihost also supports protection in a virtual environment, supporting VMware, Hyper-V and KVM hypervisors. This hybrid solution that uses the Arbor cloud to improve accuracy and speed of operation can protect your virtual machines from attacks to L7 level.
Unihost includes advanced protection against DDoS or countermeasures, which have proven effective in the largest and most complex network environments in the world.
Automated security database updates...
Companies need a reliable way to prevent internal systems from being hacked. Unihost applies a global threat detection system to block incoming and outgoing threats by evaluating the reputation of the domain and IP addresses.