Registration Log in +44 20 80 89 80 01

DDoS protection

Comprehensive cloud-based security service for protection your websites, applications or IT-infrastructure against DDos attacks.

Professional protection against DDoS attacks

The solution ensures business continuity and availability of resources for users. It prevents glitches caused by bad traffic while at the same time allowing good traffic through, keeping high availability of resources, applications and services for users. With the use of DDoS protection, even during a serious attack, the traffic does not come to you directly, but is first cleaned up.
AntiDoS from Cloud4U easily integrates with your infrastructure hosted in our cloud based on IaaS model, does not require data transfer and additional configuration, software installation or hardware purchase. Cleanup options are tailored specifically to your facility's requirements.

Service
DDoS protection
Cost
from $70,75

Cloud constructor

The service is based on DDoS Guard. The price is specified without initial payments for installation and setup.

 

How it works? 

Cloud4U has a geo-distributed traffic filtering network, which has direct connections to the networks of TIER-1 level operators, allowing you to reliably and quickly check the incoming traffic flow. The filtering nodes are located in the following cities:

  • Amsterdam, Netherlands

  • Frankfurt, Germany,

  • Tokyo, Japan,

  • Washington, USA

The existing topology allows receiving and locally filtering large volumes of traffic without creating excessive load on the backbone operators and without losing network connectivity during attacks.


 how-traffic-flows-during-at.gif

Types of DDos protection

Anti-DDoS Basic - Protection at the Network Protocol Level

Cloud4U protection modules filter traffic, delivering only legitimate requests, preventing channel traffic congestion. In the event of an attack, you are provided with a dedicated IP address/cluster of IP addresses from the protected subnet, and the provider accepts and filters all traffic coming to the dedicated IP. Using industrial equipment from world leaders in DDoS protection and monitoring, you will receive legitimate traffic already filtered out. 

The protection system operates in the mode of permanent traffic filtering, which allows you to effectively block all the known kinds of DDoS-attacks from the first anomaly packet or flow.

DDoS Protection at the Application Protocol Level

All connections to your applications go through a filtering complex. The Web Application Firewall (WAF) analyzes and cleans up application layer traffic for HTTP/HTTPS, DNS, SIP, etc., taking into account the specifics of a particular application.

The technology we use is a reliable solution as a firewall for web applications, which ensures fast, reliable and secure delivery of critical web applications. The solution meets PCI DSS security requirements by reducing web application threats and vulnerabilities, preventing theft and manipulation of important corporate data, and protecting customer information. The solution also reduces the risk of your enterprise IT infrastructure being used to attack other companies.


Why trust Cloud4U
15 years in cloud computing
Since 2009 the company has been successfully operating in the global market.
Reliable infrastructure
4 TIER III data centers, Enterprise level hardware and software: HP, Cisco, Juniper, NetApp, VMware, Veeam, Microsoft, etc.
SLA 99.982%
Optical ring, MetroCluster and redundancy mechanisms guarantee fault tolerance of services up to SLA 99.99%.
Transparent Billing Options
Hourly billing and pay-as-you-go allow you to pay only for the resources consumed.
Geo-Distributed Backup
Automatic backup in a remote data center.
Flexible scalability
You can add and reduce the amount of resources without need to contact technical support service.
24/7 technical support
If any technical issue occur, our team of support experts is available round-the-clock, response time is 10 minutes.
Partner Program
Revenue of up to 40% per contract. White Label is available.


Prices

Cost of DDoS filtering services

 
Guard Start
Guard 10
Guard 20
Guard 50
Guard 300
Guard Unlimited
DDoS attack load
1 Gb/sec     
1 Gb/sec     
3 Gb/sec     
10 Gb/sec
10 Gb/sec
unlimited
Traffic load after cleaning
3 Mbit     
10 Mbit
20 Mbit
50 Mbit
300 Mbit
unlimited
SLA
95%
97%
97%
99%
99%
99%
Response time to request for technical support
30 minutes
30 minutes
30 minutes
30 minutes     
30 minutes     
15 minutes
Payment for traffic above what is included*
0 $
0 $
0 $
0 $
0 $
0 $
Monthly payment, $
82,08
210,07
272,68
410,4
637,73
1265,44

* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge. 
Advantage: large detection base, lower false positives and support by high-level specialists.

The cost of Web Application Firewall (WAF) service

 
WAF 3
WAF 10
WAF 20
WAF 50
WAF 300
WAF Unlimited
DDoS attack load
1 Gb/sec
1 Gb/sec     
3 Gb/sec     
10 Gb/sec
10 Gb/sec
unlimited
Traffic load after cleaning
3 Mbit 
10 Mbit 
20 Mbit 
50 Mbit 
300 Mbit 
unlimited
SLA
99%
99,5%
99,5%
99,5%
99,5%
99,5%
Response time to request for technical support
30 minutes     
30 minutes
30 minutes
30 minutes     
30 minutes     
15 minutes
Payment for traffic above what is included*
0 $
0 $
0 $
0 $
0 $
0 $
Monthly payment, $
79,3
203,12
258,76
370,06
550,92
968,28

* - If the traffic exceeds the included one, the transfer to the corresponding tariff is free of charge.

One-time payments


Service
Cost
Installation and setup
62,6 $
Connection during a DDoS attack
104,34 $       


FAQ

What is a DDoS attack?

A Distributed Denial-of-Service (DDoS) attack is a coordinated cyber assault aimed at overwhelming a target system—be it a server, network, or online service—with a massive flood of internet traffic, rendering it inaccessible to legitimate users. Unlike a traditional Denial-of-Service (DoS) attack, which originates from a single source, a DDoS attack leverages a network of compromised devices, often called a botnet, that simultaneously send a deluge of requests to the target. This orchestrated barrage exhausts the target's resources, such as bandwidth, processing power, and memory, causing disruptions, slowdowns, or total shutdowns of the service. The distributed nature of the attack, with sources scattered across various locations, makes it particularly challenging to defend against and mitigate..

How does a DDoS attack happen?

A Distributed Denial-of-Service (DDoS) attack occurs when a cybercriminal uses multiple compromised computers, known as bots or zombies, to flood a targeted server with traffic. This overwhelming traffic causes the server to become unable to handle legitimate requests, resulting in a denial-of-service to normal users. Here is a step-by-step explanation of how a DDoS attack happens:Botnet Creation: A hacker creates a botnet by infecting multiple computers with malware, often through unpatched vulnerabilities or phishing attacks. These infected computers become part of the botnet, which can be controlled remotely by the hacker. Target Identification: The hacker identifies a target server or network resource to attack. This can be a website, a server, or any other online system. Attack Command: The hacker issues a command to the botnet, instructing the compromised computers to send a large volume of traffic to the targeted server simultaneously. Traffic Overload: The botnet sends a massive amount of traffic to the targeted server, overwhelming its resources and bandwidth. This can include various types of traffic, such as HTTP requests, UDP packets, or ICMP packets. Server Overload: The targeted server becomes unable to handle the excessive traffic, leading to slow performance, crashes, or complete unavailability to legitimate users. DDoS attacks can be difficult to defend against without proper detection and mitigation tools. Effective defenses include continuous monitoring, real-time alert systems, and the ability to block IP addresses and isolate targeted systems.

What layers of the OSI model are attacked during a DDoS attack?

DDoS attacks can target various levels of the OSI model, each with its own protocols and functions. Some of these levels and types of attacks include:

  • Physical layer attacks, such as attacks on cable connections or physical devices.
  • Data link layer attacks, related to exhausting the content address table, spoofing, MAC address substitution, and VLAN attacks.
  • Network layer attacks, aimed at disrupting data routing and may include attacks on DNS servers.
  • Transport layer attacks, aimed at disrupting data transmission between devices, including attacks on TCP and UDP protocols.
  • Session layer attacks, aimed at disrupting session management, including attacks on login and logout protocols.
  • Presentation layer attacks, aimed at disrupting data conversion into the required format, including attacks on encoding and protocols such as JPEG, PNG, and ASCII.
  • Application layer attacks, aimed at disrupting application functionality, including attacks on HTTP, HTTPS, FTP, and SMTP.

What types of DDoS attacks are there?

DDoS attacks are divided into:
  • Low-level attacks: flood-based attacks (such as synchronized SYN floods and other reflection attacks, like UDP user datagram packet floods), which overload resources with a large number of requests. Attacks that exploit vulnerabilities in the network protocol stack.

  • High-level attacks: application-level attacks, which target disrupting application functionality (These attacks usually have a large volume and are aimed at overloading the network or application servers). Session-level attacks, which target disrupting session management.
  • How can you protect yourself from DDoS attacks?

    Protection measures:

  • Systematic monitoring of software to identify vulnerabilities and prevent attacks.
  • Regular firmware updates for hardware to reduce the risk of attacks.
  • Regular monitoring of system and software status to prevent attacks.
  • Increasing resources to handle high traffic volumes.
  • Resource allocation for protection against attacks.
  • Developing incident response checklists and promptly contacting the provider to block DDoS traffic.
  • Using specialized DDoS protection services that can detect and filter malicious traffic.
  • Such as connection speed limiting, network-level traffic filtering, and using cloud solutions to distribute the load.
  • .

    What are the consequences of a DDoS attack?

    A DDoS attack can have the following consequences:

  • A DDoS attack can lead to the complete or partial shutdown of a web resource.
  • Attacks can result in financial losses due to resource downtime, customer loss, and reputational damage.
  • In some cases, DDoS attacks can be used as a diversionary tactic for data theft or security breaches.
  • A DDoS attack can inflict significant reputational damage to a company if there is no timely and effective response to the attack.
  • Attacks can be used for extortion or blackmail, where attackers demand money or other benefits in exchange for stopping the attack.
  • DDoS attacks can be used to compromise resource security, leading to data theft or access to confidential information.
  • Recovering from a DDoS attack may require significant expenses for repairing and updating infrastructure.
  • A DDoS attack can lead to a loss of customer trust if the resource cannot ensure adequate availability and security.
  • In some cases, DDoS attacks can result in legal consequences if the attack violates laws or security regulations.
  • .

    How does DDoS protection work?

    DDoS protection works by monitoring traffic and blocking suspicious requests to prevent resource overload. It can be implemented using a cloud-based model without requiring specialized equipment on the customer's side. DDoS protection services typically include setting up monitoring and traffic filtering rules, as well as a dedicated team of experts with practical experience in protecting against cyberattacks.

    What is the cost of DDoS protection?

    The cost of DDoS protection can vary depending on the type of protection, provider, and resource volume.Types of DDoS protection:

  • Basic protection - can cost from $50 to $500 per month, depending on the provider and resource volume.
  • Advanced protection - can cost from $500 to $5,000 per month, depending on the provider and resource volume.
  • Premium protection - can cost from $5,000 to $10,000 per month, depending on the provider and resource volume.
  • The main factors influencing the cost are: resource volume, type of protection, chosen provider, and the level of complexity of DDoS protection.

    .

    How to determine if it's a DDoS attack?

    You can determine if it's a DDoS attack by the following signs:

    • Sudden increase in traffic to the resource.
    • Increased load on the resource, exceeding its bandwidth capacity.
    • Multiple requests from a single IP address.
    • Anomalous requests that do not conform to standard requests.
    • Sudden increase in server errors, such as 500 or 503 errors.
    • Increase in resource response time.
    • Sudden increase in the number of requests to the resource.
    • Sudden increase in database load.
    • Sudden increase in server log errors.

    What is the role of CDN in DDoS protection?

    A CDN (Content Delivery Network) can play a crucial role in protecting against DDoS attacks, as it can help distribute traffic and reduce the load on the resource. A CDN can protect a website from DDoS attacks, especially if it uses static content and GET requests.
    Send a request
    Let our managers know if you are interested in a solution or a service. They will contacts you within 2 hours.
    You also can request a free trial access here
    Scroll up!