Our approach to protecting your websites & gameserver is not complicated nor earth shattering, in fact it’s simple and effective. Like many other providers we function as a Reverse Proxy,
In computing, a denial-of-service (DoS) attack is an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. A distributed denial-of-service (DDoS) is where the attack source is more than one–and often thousands–of unique IP addresses.
Criminal perpetrators of DoS attacks often target sites or services hosted on high-profile web servers such as banks, credit card payment gateways; but motives of revenge, blackmail or activism can be behind other attacks.
Denial-of-service attacks can also lead to problems in the network 'branches' around the actual computer being attacked. For example, the bandwidth of a router between the Internet and a LAN may be consumed by an attack, compromising not only the intended computer, but also the entire network or other computers on the LAN.
If the attack is conducted on a sufficiently large scale, entire geographical regions of Internet connectivity can be compromised without the attacker's knowledge or intent by incorrectly configured or flimsy network infrastructure equipment.
A denial-of-service attack is characterized by an explicit attempt by attackers to prevent legitimate users of a service from using that service. There are two general forms of DoS attacks: those that crash services and those that flood services.
Internet Control Message Protocol (ICMPl4) flood
(S)SYN flood Teardrop attacks / Slow Read attack
HTTP POST DDOS attacks / R-U-Dead-Yet? (RUDY)
Peer-to-peer attacks / UDP-based Amplification Attacks
Distributed attack / Telephony denial-of-service (TDoS)
Reflected / spoofed attack / Denial-of-service Level II
Permanent denial-of-service attacks
Advanced Persistent DoS (APDoS)
DDoS Extortion / Nuke
Application-level floods
SecureAttack DDoS Protection Solutions has mitigation centers in geographically diverse locations around the world, All traffic is passed through a "cleaning center" or a "scrubbing center" via various methods such as proxies, tunnels or even direct circuits, which separates "bad" traffic (DDoS and also other common internet attacks) and only sends good traffic beyond to the server.
Using our Premium DDoS Protection Hosting Solutions, we ensure that your website hosting service is always accessible, even in the event of an attack! This protection is essential because, “It’s not a question of knowing if you need anti-DDoS protection but rather when you will first be the victim of an attack.”
Talk to one of our Hosting specialists who will review your needs and propose
a tailored IT solution that will match your specific business reality and needs!