DDoS Mitigation

1Tbps+ Filter capacity

DDoS attacks are a constant threat. They jeopardise the availability of your infrastructure and can seriously damage your business. Their purpose may be extortion, damage from competitors or even vandalism. Do not become the next victim of a DDoS attack. Be protected by our automated, highly efficient and expertly developed DDoS mitigation services.

How does our Mitigation work?

Once a subnet is advertised to Voxility – client may use the following states to address EACH IP:

  • sensor” > detects and starts DDoS mitigation on the traffic only when a DDoS attack is detected
  • always on” > traffic is always filtered against DDoS attacks, good for IPs that are very sensitive to abrupt load of traffic, but we do not recommend this status unless is necessary
  • always off” > doesn’t filter the traffic against DDoS attacks whatever happens

 

For first 2 states you can ask us to disable layer 7 filtering (which is activated by default).

We inspect layers 2, 3, 4 and 7, which are actually all layers that are relevant to be inspected.

We have implemented anti-spoof for TCP (layer 3) to HTTP bots (layer 7). These are just examples.

If you are using our anti DDoS with layer 7 filtering (reverse proxy), when you receive an attack toward web server port 80, the content of your site is cached by DoS filter. Only non-cached filtered traffic will reach your server.

Reverse Proxy is an army of web servers that cache your content and multiplies the capacity of your server hundreds of times. As a side effect it accelerates web-content delivery. Content that cannot be cached is passed to your server after the user-initiated session is checked against possible malformations.

All the IPs announced initially with a DDoS protected dedicated server are in status “sensor” mode by default after importation, but we can manually change the status if you send us an email once you start testing/using the service.

Voxility has sensors to detect attacks everywhere in the network. When a suspicious pattern is detected, traffic toward that IP is redirected for mitigation in the same datacenter Security Cloud.

The network sensors detects instantly when an attack occurs and redirects traffic in seconds from the affected IP to the mitigation cloud:

Redirection stops within minutes after the attack ends.

How “Always on mode” works?

Instead of permitting traffic to flow directly toward you server, this protection mode permanently applies the anti-DDoS filters.

 

How “Layer 7” works?

At the moment layer 7 filtering applies only for web services (TCP traffic on destination ports: 80, 443, 2078, 2083, 2087, 2095, 2096). Basically the ddos protection runs as reverse proxy for the mentioned ports.

Therefore, Layer 7 works with HTTP and HTTPS.

We have implemented anti-spoof for TCP (layer 3) to HTTP bots (layer 7). These are just examples.

If you are using our anti DDoS with layer 7 filtering (reverse proxy), when you receive an attack toward web server port 80, the content of your site is cached by DDoS filter. Only non-cached filtered traffic will reach your server.

Reverse Proxy is an army of web servers that cache your content and multiplies the capacity of your server hundreds of times. As a side effect it accelerates web-content delivery. Content that cannot be cached is passed to your server after the user-initiated session is checked against possible malformations.

Do you need quick help?