500Gbps Anti-DDoS that Works with Any Application

Every single IP that receives traffic from Internet through HostingFuze Network may be protected against any type of DDoS attack:

Service provided by our partners Voxility.

A network sensor detects instantly when an attack occurs and redirects traffic in seconds from the affected IP to the mitigation cloud. Redirection stops within minutes after the attack ends.

500Gbps Anti-DDoS that Works with Any Application

500Gbps Anti-DDoS that Works with Any Application

How does it work?

The sensors detects attacks everywhere in the network. When a suspicious pattern is detected, traffic toward that IP is redirected for mitigation in the same datacenter Security Cloud.

In very rare cases, inbound capacity of a single Security Cloud might be overwhelmed and it triggers automatically a global “hijacking” of the attacked IP in some, if not all Voxility Security Clouds.

The process of detecting, filtering and hijacking is completely automated and it is so fast that it seems to be in real-time.

Types of DDoS attacks filtered

• DDoS attacks filtering 80%. This filtering capability is agreed for the following threats:

• IP non-existing protocol attack such as Flood with IP packets with reserved values in protocol field;

• Attack with fragments such as sending mangled IP fragments with overlapping, over-sized payloads to the target machine;

• ICMP attacks such as: ICMP Flood, Smack, Smurf attack (OBSOLETE);

• IGMP attacks such as: IGMP flood;

• TCP attacks such as: SYN Flood, SYN-ACK Flood, ACK Flood, FIN Flood, RST Flood, TCP ECE Flood, TCP NULL Flood, TCP Erroneous Flags Flood, TCP Xmas, Fake Session, SRC IP Same as DST IP;

• UDP attacks such as: General Random UDP Floods, Fraggle, DNS query, DNS Amplification (+DNSSEC), NTP Amplification, SNMPv2, NetBIOS, SDP, CharGEN, QOTD, BitTorrent, Kad, Quake Network Protocol, Steam Protocol;

• HTTP attacks such as: Slowloris (Apache / IIS Attack), R-U-Dead-Yet (RUDY), HTTP Object Request Flood;

• Other category attacks such as: Misused Application Attack, Slow Read attack.

DDoS protection modes:

1. Sensor mode:

• a. with Layer 7 filtering

• b. without Layer 7 filtering
How sensor mode works?

If there is no attack tergeting your Ip address, the traffic flows directly to your equipment as in normal mode of operation.

Voxility has sensors to detect attacks everywhere in the network. When a suspicious pattern is detected, traffic toward that IP is redirected for mitigation in the same datacenter Security Cloud.

The network sensors detects instantly when an attack occurs and redirects traffic in seconds from the affected IP to the mitigation cloud.

Redirection stops within minutes after the attack ends.

2. Always ON mode:

• a. with Layer 7 filtering

• b. without Layer 7 filtering
How Always on mode works?

Instead of permitting traffic to flow directly toward you server, this protection mode permanently applies the anti-ddos filters. Basically, the traffic flows permanently through the Voxility Security Cloud as in the scheme below.

3. OFF

How Layer 7 filtering works?

At the moment layer 7 filtering applies only for web services (TCP traffic on destination ports: 80, 443, 2078, 2083, 2087, 2095, 2096). Basically the ddos protection runs as a reverse proxy for the mentioned ports.

Therefore, to answer your question, Layer 7 works with HTTP and HTTPS.

Need 250 or 500Gbps Anti-DDoS that Works with Any Application ? Contact me …