DDoS protection
Professional protection against DDoS attacks
AntiDoS from Cloud4U easily integrates with your infrastructure hosted in our cloud based on IaaS model, does not require data transfer and additional configuration, software installation or hardware purchase. Cleanup options are tailored specifically to your facility's requirements.
Cloud constructor
The service is based on DDoS Guard. The price is specified without initial payments for installation and setup.
How it works?
Cloud4U has a geo-distributed traffic filtering network, which has direct connections to the networks of TIER-1 level operators, allowing you to reliably and quickly check the incoming traffic flow. The filtering nodes are located in the following cities:
Amsterdam, Netherlands
Frankfurt, Germany,
Tokyo, Japan,
Washington, USA
The existing topology allows receiving and locally filtering large volumes of traffic without creating excessive load on the backbone operators and without losing network connectivity during attacks.
Types of DDos protection
Anti-DDoS Basic - Protection at the Network Protocol Level
Cloud4U protection modules filter traffic, delivering only legitimate requests, preventing channel traffic congestion. In the event of an attack, you are provided with a dedicated IP address/cluster of IP addresses from the protected subnet, and the provider accepts and filters all traffic coming to the dedicated IP. Using industrial equipment from world leaders in DDoS protection and monitoring, you will receive legitimate traffic already filtered out.
The protection system operates in the mode of permanent traffic filtering, which allows you to effectively block all the known kinds of DDoS-attacks from the first anomaly packet or flow.
DDoS Protection at the Application Protocol Level
All connections to your applications go through a filtering complex. The Web Application Firewall (WAF) analyzes and cleans up application layer traffic for HTTP/HTTPS, DNS, SIP, etc., taking into account the specifics of a particular application.
The technology we use is a reliable solution as a firewall for web applications, which ensures fast, reliable and secure delivery of critical web applications. The solution meets PCI DSS security requirements by reducing web application threats and vulnerabilities, preventing theft and manipulation of important corporate data, and protecting customer information. The solution also reduces the risk of your enterprise IT infrastructure being used to attack other companies.
Prices
Cost of DDoS filtering services
Guard Start
|
Guard 10
|
Guard 20
|
Guard 50
|
Guard 300
|
Guard Unlimited
|
|
---|---|---|---|---|---|---|
DDoS attack load |
1 Gb/sec
|
1 Gb/sec
|
3 Gb/sec
|
10 Gb/sec
|
10 Gb/sec
|
unlimited
|
Traffic load after cleaning |
3 Mbit
|
10 Mbit
|
20 Mbit
|
50 Mbit
|
300 Mbit
|
unlimited
|
SLA |
95%
|
97%
|
97%
|
99%
|
99%
|
99%
|
Response time to request for technical support |
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
15 minutes
|
Payment for traffic above what is included* |
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
Monthly payment, $ |
82,08
|
210,07
|
272,68
|
410,4
|
637,73
|
1265,44
|
* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge.
Advantage: large detection base, lower false positives and support by high-level specialists.
The cost of Web Application Firewall (WAF) service
WAF 3
|
WAF 10
|
WAF 20
|
WAF 50
|
WAF 300
|
WAF Unlimited
|
|
---|---|---|---|---|---|---|
DDoS attack load |
1 Gb/sec
|
1 Gb/sec
|
3 Gb/sec
|
10 Gb/sec |
10 Gb/sec
|
unlimited
|
Traffic load after cleaning |
3 Mbit
|
10 Mbit
|
20 Mbit
|
50 Mbit
|
300 Mbit
|
unlimited
|
SLA |
99%
|
99,5%
|
99,5%
|
99,5%
|
99,5%
|
99,5%
|
Response time to request for technical support |
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
30 minutes
|
15 minutes
|
Payment for traffic above what is included* |
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
0 $
|
Monthly payment, $ |
79,3
|
203,12
|
258,76
|
370,06
|
550,92
|
968,28
|
* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge.
One-time payments
Service |
Cost
|
---|---|
Installation and setup |
62,6 $
|
Connection during a DDoS attack |
104,34 $
|
FAQ
What is a DDoS attack?
How does a DDoS attack happen?
What layers of the OSI model are attacked during a DDoS attack?
DDoS attacks can target various levels of the OSI model, each with its own protocols and functions. Some of these levels and types of attacks include:
- Physical layer attacks, such as attacks on cable connections or physical devices.
- Data link layer attacks, related to exhausting the content address table, spoofing, MAC address substitution, and VLAN attacks.
- Network layer attacks, aimed at disrupting data routing and may include attacks on DNS servers.
- Transport layer attacks, aimed at disrupting data transmission between devices, including attacks on TCP and UDP protocols.
- Session layer attacks, aimed at disrupting session management, including attacks on login and logout protocols.
- Presentation layer attacks, aimed at disrupting data conversion into the required format, including attacks on encoding and protocols such as JPEG, PNG, and ASCII.
- Application layer attacks, aimed at disrupting application functionality, including attacks on HTTP, HTTPS, FTP, and SMTP.
What types of DDoS attacks are there?
How can you protect yourself from DDoS attacks?
Protection measures:
What are the consequences of a DDoS attack?
A DDoS attack can have the following consequences:
How does DDoS protection work?
What is the cost of DDoS protection?
The cost of DDoS protection can vary depending on the type of protection, provider, and resource volume.Types of DDoS protection:
The main factors influencing the cost are: resource volume, type of protection, chosen provider, and the level of complexity of DDoS protection.
.How to determine if it's a DDoS attack?
You can determine if it's a DDoS attack by the following signs:
- Sudden increase in traffic to the resource.
- Increased load on the resource, exceeding its bandwidth capacity.
- Multiple requests from a single IP address.
- Anomalous requests that do not conform to standard requests.
- Sudden increase in server errors, such as 500 or 503 errors.
- Increase in resource response time.
- Sudden increase in the number of requests to the resource.
- Sudden increase in database load.
- Sudden increase in server log errors.