You must Sign In to post a response.
  • Category: Internet, Networking and Connectivity

    What is Remote DDoS Protection?

    Know from our network experts what is Remote DDoS protection and which companies are best in providing this service.

    I have been wondering about this as I have some need for this in my business. I came across a service provider that is providing remote DDOS protection named BlockDdoS. Can anyone tell me is this safe to go and a good service provider???
  • Answers

    2 Answers found.
  • There are some big sites that have to manage data for a large number of users or consumers. Sometimes the users find that the site becomes slow and less responsive. In many cases, this is not a system problem but it is sabotage being done by some criminal online experts who attack the site and affect its applications and alters them and makes them less efficient. These attacks are known as application-level distributed denial of service (Application DDoS). It is known by some other names also like 'low and slow attacks', 'layer 7 DOS attacks', and 'asymmetric attacks'.

    This problem has been encountered in the companies and many solution providers have emerged on the internet to help the companies to fight these mischievous attacks which slow down the working of the company site and affect it in many ways.

    There are many such solution providers including one that you have mentioned in your query.
    Some of the reputed DDoS protection service providing companies are - Cloudflare, Imperva Incapsula, Arbor DDoS, Kentik, A10 Thunder, Radware DefensePro etc.

    Knowledge is power.

  • Remote DDOS attack:
    Interrupting the normal network traffic flow towards a target server using malware from a remote location can be called a "Remote DDOS attack". Here, hackers use some compromised servers. The pool of requests from these bad servers will clog the organic traffic to the server. Once the access is gained, the target server can be controlled remotely.

    Types of DDOS attacks:
    Flooding all open ports with false traffic is called a "volumetric attack". Attackers mainly target layer seven i.e. the Application layer, using the HTTP, DNS, etc, requests masking it as legit traffic is called "Application layer Attack". Using TCP/IP handshake request and sending only partial packets like SYN to target sever to delay the process by making it wait forever known as SYN Flood, using malformed pings to hang the server, belong to "Protocol Attack".

    How to find DDOS Attack?
    Server admin has to be alert when,
    I. A network traffic coming from the same location, or from a single IP address, or a similar range of IPs.
    II. Also, if a single profile is placing a million requests for a single page.
    III. Getting a hike in network traffic at odd hours.

    1. Having a DDOS response plan, by defining security measures in advance before the DDOS attack occurrence.
    2. Protecting the network infrastructure at multiple levels.
    3. Using cloud security.
    4. Using a DDOS mitigation service like Cloudflare, Forrester, etc.

  • Sign In to post your comments