Many publicly accessible corporate websites are subject to hacker attacks. A common scenario is when a website is overloaded by a flood of requests from different IP addresses within a short period of time. This is what is known as a distributed denial-of-service attack (DDoS). The sheer amount of requests brings the website to its knees, rendering the service unavailable. For owners, this is a highly unpleasant scenario.
Website hosts can protect themselves from these kind of attacks with a software-based security feature: Anti-DDoS automatically detects DDoS attacks by checking incoming requests for malicious intent. In the event of an attack, it redirects spurious requests and ensures that the service remains online without sapping any additonal resources.
The Anti-DDoS service protects elastic IP addresses (EIPs) against DDoS attacks at the network and application levels, immidiately sending an alert when an attack is detected. In addition, Anti-DDoS optimizes bandwidth use and ensures a stable operation of users' services.
Anti-DDoS monitors service traffic from the web to the EIPs in order to detect attacks traffic in real time. It then purges the attack traffic according to previously defined defense policies by the user, so that services return to normal. The service also generates monitoring reports that provide users with a clear assessment of their network security.
Reasons for Anti-DDoS in the Open Telekom Cloud
Key Features of Anti-DDoS
DDoS attack protection without customer service disruptions
The Anti-DDoS service protects against attacks on the third (network), fourth (transport) and seventh (application) layer.
Third and fourth layer DDoS attacks are a type of volumetric DDoS attack and rely on extremely high volumes of data (floods) to slow down web server performance, consume bandwidth, and ultimately hinder access for legitimate users. Including attacks such as synchronized (SYN) floods, these are the most common attack vectors used to overload the capacity of application servers, but are able to be detected and redirected via signatures.
Seventh layer DDoS attacks aim to overload specific elements of an application server's infrastructure. These attacks are particularly complex, inconspicuous, and difficult to detect as they are similar in appearance to legitimate website traffic. With attacks like HTTP GET flood, attackers try to send a huge flood of requests to the server in order to overload its resources.
Protect Your Data
Websites are vulnerable to DDoS attacks, which can ultimately cause them to crash. However, Anti-DDoS can defend against multi-layer (4 through 7) attacks, helping to improve a customer's browsing experience. Additional use of the Web Application Firewall (WAF) can also avert attacks such as SQL Injection or Cross Site Scripting (XSS).
- Stable services: Protects against DDoS attacks at the transmission and application layer, ensuring website stability.
- Reliable connections: Protects against reflection and amplification attacks, making connections highly reliable.
- Completely free: With just one click you get complete protection.
Websites | Portals | E-Commerce
FAQ: Frequently Asked Questions
Which services does Anti-DDoS protect?
How do I use Anti-DDoS?
Anti-DDoS protection is automatically enabled for the elastic IP addresses you purchased. If protection is not yet enabled for an IP address you own, you can activate it directly in the Anti-DDoS console. For a detailed guide, please follow the instructions in the Help Center.
Which types of attacks does Anti-DDoS protect me from?
Anti-DDoS helps users handle traffic attacks with ease. It can accurately detect connection exhaustion and attacks on slow connections and can help users defend against the following attacks:
- Web server attacks
e.g. SYN-Flood, HTTP-Flood, Challenge Collapsar (CC) and attacks on slow connections
- Volumetric attacks
e.g. User Datagram Protocol (UDP) flood, SYN flood, Transmission Control Protocol (TCP) and Fragment attacks
- HTTPS server attacks
e.g. SSL DoS and DDoS attacks
- DNS server attacks
e.g. attacks which target the vulnerabilities in the Domain Name Server (DNS) protocol stack, DNS reflection attacks, DNS flood attacks, and DNS cache miss attacks
A detailed overview of all functions can be found in the Help Center.
Find out more
Do you have any questions?
Are you interested in Anti-DDoS or do you have any questions regarding Anti-DDoS? I will be happy to answer your questions in a free consultation!
T-Systems International GmbH