DDoS protection
Professional protection against DDoS attacks
Anti-DDoS from Cloud4Y easily integrates with your infrastructure hosted in our IaaS cloud. Neither data transfer nor additional set-up, software installation or equipment purchase is required. Cleaning options are tailored specifically to your facility's requirements.
The service is based on DDoS Guard. The price is specified without initial payments for installation and setup.
How it works?
Cloud4Y has a geo-distributed traffic filtering network, which has direct connections to the networks of TIER-1 level operators, allowing you to reliably and quickly check the incoming traffic flow. The filtering nodes are in the following locations:
Amsterdam, the Netherlands
Frankfurt, Germany,
Moscow, Russia,
Tokyo, Japan,
Washington, USA
The existing topology allows receiving and local filtering of large volumes of traffic without creating excessive load on the core operators and without losing network connectivity during attacks.
Types of DDos protection
Anti-DDoS Basic - Protection at the Network Protocol Level
Cloud4Y protection modules filter traffic, delivering only legitimate requests, preventing channel traffic congestion. In the event of an attack, you are provided with a dedicated IP address/cluster of IP addresses from the protected subnet, and the provider accepts and filters all traffic coming to the dedicated IP. Using equipment from world leaders in DDoS protection and monitoring, you will receive legitimate traffic already filtered out.
The protection system operates in the mode of permanent traffic filtering, which allows you to effectively block all the known kinds of DDoS-attacks from the first anomaly packet or flow.
DDoS Protection at the Application Protocol Level
All connections to your applications go through a filtering complex. The Web Application Firewall (WAF) analyzes and cleans up application layer traffic for HTTP/HTTPS, DNS, SIP, etc., taking into account the specifics of a particular application.
The technology we use is a reliable solution as a firewall for web applications, which ensures fast, reliable and secure delivery of critical web applications. The solution meets PCI DSS security requirements by reducing web application threats and vulnerabilities, preventing theft and manipulation of important corporate data, and protecting customer information. The solution also reduces the risk of your enterprise IT infrastructure being used to attack other companies.
Prices
Cost of DDoS filtering services
Guard Start
|
Guard 10
|
Guard 20
|
Guard 50
|
Guard 300
|
Guard Unlimited
|
|
---|---|---|---|---|---|---|
DDoS attack load |
1 Gb/sec
|
1 Gb/sec
|
3 Gb/sec
|
10 Gb/sec
|
10 Gb/sec
|
unlimited
|
Traffic load after cleaning |
3 Mbit
|
10 Mbit
|
20 Mbit
|
50 Mbit
|
300 Mbit
|
unlimited
|
SLA |
95%
|
97%
|
97%
|
99%
|
99%
|
99%
|
Response time to request for technical support |
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
15 minutes
|
Payment for traffic above what is included* |
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
Monthly payment, $ |
82,08
|
210,07
|
272,68
|
410,4
|
637,73
|
1265,44
|
* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge.
Advantage: large detection base, lower false positives and support by high-level specialists.
The cost of WAF services
WAF 3
|
WAF 10
|
WAF 20
|
WAF 50
|
WAF 300
|
WAF Unlimited
|
|
---|---|---|---|---|---|---|
DDoS attack load |
1 Gb/sec
|
1 Gb/sec
|
3 Gb/sec
|
10 Gb/sec |
10 Gb/sec
|
unlimited
|
Traffic load after cleaning |
3 Mbit
|
10 Mbit
|
20 Mbit
|
50 Mbit
|
300 Mbit
|
unlimited
|
SLA |
99%
|
99,5%
|
99,5%
|
99,5%
|
99,5%
|
99,5%
|
Response time to request for technical support |
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
15 minutes
|
Payment for traffic above what is included* |
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
Monthly payment, $ |
79,3
|
203,12
|
258,76
|
370,06
|
550,92
|
968,28
|
* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge.
One-time payments
Service |
Cost
|
---|---|
Installation and setup |
62,6 $
|
Connection during a DDoS attack |
104,34 $
|
FAQ
Frequently asked questions (FAQ)
1. What is DDoS?DDoS (Distributed Denial of Service) is a hacker attack from multiple distributed points on the Internet on a computer system in order to disable it. In other words, it is the creation of conditions such that legitimate users will not be able to access system resources (servers) or this access will be significantly hindered.
2. Why do hackers launch attacks?
DDoS attacks on an online shop or corporate portal are often organised at the behest of competitors in order to disable them and consequently reduce sales or reputation. However, there are also unintentional attacks - for example, if your site is visited by a huge number of users simultaneously, far more than your site can handle. " Weak" hosting in this case can not withstand and "falls". If this happens, you need to switch to higher bandwidth rates or change your hosting provider.
3. How to protect resources from DDoS?
The right solution is to choose a hosting provider with effective protection system against DDoS-attacks.
4. Will a basic firewall help protect against DDoS attacks?
It won't. The goal of today's DDoS attacks is to execute the network channel of the targeted service. It's a brute force technique whereby hundreds or even thousands of infected devices, forming a so-called "botnet", send parasitic traffic to the target service. As a result, legitimate users cannot access the attacked service because the entire network bandwidth is busy and there is no free bandwidth available. Firewalls have no role here, as they are not involved in the process, and it no longer matters if they filter out the parasite traffic or not.
The task of anti-DDoS-hoster: having redundant network channels with a wide bandwidth of tens Gbps, with geographically distributed access to the Internet, as well as having redundant hardware routers/firewalls, to receive all traffic on its own hardware, filter it on specialized analyzers and deliver to the client service only legitimate traffic.
Find more answers to your questions in our knowledge base. If you do not find an answer, ask our manager using online-chat or send an inquiry using the ticket system.