Protection against DDoS attacks

A DDoS attack is a denial-of-service attack that makes an online service inaccessible to users by interrupting or suspending the host service. The point is that DDoS uses Internet-connected devices to drive harmful traffic. There is a difference between DDoS and DoS. DDoS is a distributed attack from many sources, and DoS uses a single Internet-connected device. We can protect your website or even your office from such attacks of various kinds and find solutions for your business.

Get in touch

About service

DDoS attacks: three main types


Volume base attacks.

Their goal is to use all available floods between, for example, your site and the Internet. The result is massive traffic to reload your bandwidth and block your traffic.


Protocol attacks.

The point of such an attack is to deplete resources and cause disruptions because of excessive consumption of resources. Also, such an attack can consume resources of communication equipment, such as firewalls, load balancers.


Application layer attacks.

These are attacks that target Apache, Windows, or Linux vulnerabilities and more. The purpose is to crash the web server. It measured the magnitude in Requests per second. The difficulty with such an attack is that it is difficult to distinguish between legitimate and innocent requests.

About service

Technical classification of attacks

Memcached DDoS-attack

a type of attack when an attacker uses vulnerabilities in Memcached servers to amplify attacks;

NTP Amplification

the use NTP vulnerabilities for overload;

DNS Amplification

to overload the attacker uses vulnerabilities of open DNS servers;

SSDP attack

increase traffic through the use of vulnerabilities in the Universal Plug and Play (UPnP) network protocols;

DNS flood

an attacker attacks the DNS servers of a particular domain to disrupt the service of DNS queries for that domain;


an overload of the target server with HTTP requests;

SYN Flood

the primary goal: to make the server inaccessible to legitimate traffic, consuming all available server resources through the use of SYN packets;

UDP Flood

many UDP packets are sent to the target server so that the device can not process information and respond;

Ping (ICMP) Flood

sending many ICMP packets to make the target inaccessible to normal traffic;

Low and slow attack

a small amount of slow traffic, which is important to distinguish from normal traffic, so it is important to stop such an attack;

Application layer attack

network protocol layer 7 attacks that use not only network resources but also the resources of the server itself

Layer 3 attack

an attack using a large amount of traffic to stop normal traffic;

ACK Flood

The server handles many ACK packets, so it cannot service other traffic.

About service

What harm could it do to business

  • ideology, as some use DDoS attacks only because they do not agree, for example, with the site content;
  • business disputes to cause the failure of the competitor's site, due to which he will lose customers, image, and money;
  • boredom, because some make such attacks just to have fun;
  • extortion, during which they use the attacks or threatening them they intimidate to get money;
  • cyber warfare, during which DDoS attacks can damage opposition sites or even the infrastructure of another country.

About service

What harm could it do to business

Website attack

For example, you use a site for customer traffic. Imagine that for a day the site simply turned off. Customers can not send an order, buy a product or order a service, because of which you lose money, image, and customers as well.

Office attack

You've got a Call Center and you get thousands of calls a day. While the office attack, all employees can’t take calls. The result is the same as with a website.

Ready used service attack

Everyone uses services for business. For example, the order accounting program. Now imagine a day when this program just won't work. Most likely your business will also stop.

About service

How a DDoS attack happens

These are the kinds of attacks they make using lots of computers with Internet access. Attackers infect computers and various devices with malware to control them remotely. Separately, they are called bots, the group is a botnet.
The attacker sends instructions to the bots, and each of them sends requests to the IP address of the resource being attacked. As a result, it overloads the server or network, after which it fails. Keep in mind that a single bot is a legitimate device on the Internet, so it is difficult to identify which traffic is harmful.

About service

DDoS attack signs

The most common attack symptoms include a strong slowdown of the site or its total incapacity to work. But there are other signs:

  • Suspicious traffic coming from a single IP address.
  • Lots of traffic from similar users with the same location, device type, or browser version.
  • Too much traffic on a particular page when other pages of the same site do not have it.
  • Non-standard traffic. For example, it may increase every 10-15 minutes or only for odd hours.

In each case, check the site, service, or office for DDoS attacks, as in the future it may lead to customer and money loss, or harm the company image. Therefore, it is best to contact professionals once to protect your website or the entire office from such attacks.

Send us a message

Let’s do smth great together

By clicking 'Send message' button, you agree to our Privacy Policy,including our cookie use.


Feel free to contact us

Follow us:

main [email protected]

We love our inbox - drop us an email.

tel: +38 067 007 71 57
  +38 044 392 71 57

Call us! We are always glad to hear from you!

Back to top