DoS-attack – (Denial of Service) – The attack on the server for the purpose of disabling it, that is to create conditions under which legitimate (lawful) system users can not get access to the provided system resources, or the access is difficult. System failure can be both an end in itself (for example, to make unavailable popular site), and one of the control steps of the system.
If the attack is carried out simultaneously with a large number of computers that talk about DDoS-attack (Distributed Denial of Service, distributed attack such as “denial of service”).
Rental of telecommunication cabinets and colocation in the data center
HTTP flood – send to the website a few tens of thousands of GET requests, POST, HTTP 1.1 on the port 80 web server.
UDP flood – sent to the address of the set of UDP packets system. This method was used in earlier attacks and is now considered to be the least dangerous.
TCP flood – sending out the address of the server for TCP-packets of the set, which also leads to an overload of network resources.
TCP SYN flood – sending a large number of requests for TCP-connections which initialize as a result, had to spend all its resources to ensure that the process is partially open connections.
Smurf-атака – ICMP ping requests to the address directed broadcast packets using this query fake source address as a result turns out to be the target of attacks. ICMP flood – attack The Smurf similar, but without the use of mailing.
SPAM flood – a rare type of attack, use your e-mail service to send large number of emails. How to detect the attack. Detection methods can be divided into several large groups: statistics – based on quantitative analysis of traffic; signature – based on a qualitative analysis of traffic;
For a static method as a first step of detecting an attack, you must install the network traffic monitoring software. The Internet is chosen a large number of the software, for example, we can recommend the MRTG, Munin, Cacti any of these programs will help you to identify the fact of the attack. Also, you can use the network traffic monitoring systems provided by our Data Center.
Next comes into force signature method, you must determine which of the protocols and ports is attack. Determine this is possible by doping and subsequent analysis of network traffic. For the collection of traffic would like to recommend the tool “tcpdump” tcpdump (TCP or English dump -. Dump, dumping) – UNIX utility (available clone for Windows), allows you to capture and analyze network traffic through a computer that is running this utility.
|Proxy malicious traffic|
|Protection site in the location «0x2a DC»|
|Server Protection in the location «0x2a DC»|
|Protecting content in any location|
|Securing the server in any location|
Cost of work:
Daily, weekly backups of virtual servers, websites, databases.
Round the clock technical support. Our experts at any time to help solve your problems.
Our company offers competitive prices for the rental of equipment and accommodation.
The quality of services you can be sure using the free trial period.