Openly Managing and Securing Your Digital World

Defending DDoS Attacks

You have a server under DDoS attack? no problems, our experienced engineers have metigated multi-gigabit/second DDoS attacks that lasted for more than 9 months, with a relatively low cost. We won't ask you to direct your DNS to us, alternatively we will provide you with our expertise and work. We will ask you to register on a certain datacenter that makes no charge for the incoming traffic (or at your preference any other datacenter), and you grant us access to your account, we will bring up few frontlines (based on the attack volume, normally if your attack is less than 1gbps it will be only one), and we will optimize it to proxy your actual server. With us tuning everything on the server it should be able to handle all that its hardware can handle. These frontlines should be of low specs so it shouldn't be costy.

Benefits:

  • Payment is not depending on the amount of DDoS traffic (unless it reaches the point of bringing up more frontlines, you will pay the hardware cost).
  • The DDoS defending will be completely transparent from your side.
  • The defending servers (i.e the frontlines) are yours, you can keep them up after the attack stops if you like.
  • Enhanced overall security to your server as you will close any access to it except from the frontlines, which will save you the headache of penetration attempts that happens while you are busy defending DDoS.

 

How things work:

  • If you are under DDoS, or want to be protected from a potential DDoS, contact us to with the details of the attack. Please try to encode your message using our gpg key if it contains sensitive information.
  • We will contact you back with a quote of the analysis phase (or at your preference can be on hourly basis), during this phase you should grant us access on your current server, or at least get us the logs and the data we require from you. Then we end up with the best solution for defending this DDoS attack.
  • If you approve, we will start building the frontlines and security measures we proposed from the analysis phase. This should take few business days depending on the complexity of the attack.
  • After this point, we will continue to handle the frontlines for you, and cope with the changes of attack type, because it's normal that the attacker changes the attack type when he finds that there's a metigation layer. Normally this phase is extended after the attack stops by at least few weeks to make sure that it's not coming back.

Creative Commons License
Powered by GNU/LinuxPowered by debianPowered by Drupal