- Traffic monitoring and protection against volumetric attacks
- Stable and uninterrupted operation of the company
- Protection against financial losses and image detriment
- Efficient protection of key business processes
- Automatic action and human factor elimination
- Very fast response time (critical for DDoS attacks) – threat is detected and neutralized in a few seconds
- Support of specialized staff, using the best technology in its class
- View of statistics
- Email notification
- Fast implementation
DDoS attack (Distributed Denial of Service) is a distributed denial of service. This is one of the many methods used to block online web sites or links.
Atman’s AntiDDoS 2.0 service protects against all the most common types of volumetric attacks, including: SYN flood, UDP flood, ICMP flood, NTP reflection, DNS reflection.
Volumetric attack. Involves mass-mailing of unsolicited data to the designated IP address. Volume of incoming data is so high that internet links are not able to accept them.
Application attack. Involves exhausting the IT resources of web applications, such as computing power or memory.
The solution is based on hardware components and application. Hardware components include Sensor and Scrubber, which are installed in the Atman Data Center WAW-1 and Atman Data Center WAW-2.
Address pools are identified in the system which are to be observed. When the alarm threshold is exceeded, an anomaly is signaled.
The standard response to the anomaly is to run a filter, which means that the attacked host's traffic is redirected to the scrubbers to mitigate the DDoS attack. Filtered traffic is sent back to the client by its primary link.
Protection against attacks is off
Internet access service without protection against DDoS attacks
Protection is on
Internet access service with protection against DDoS attacks on (without attack)
With protection during attack
Internet access service with protection against DDoS attacks on (during attack)
The number and the scale of attacks are increasing from year to year. DDoS attacks are commonly used by cyber criminals to paralyze systems and networks connected to the Internet.
Each firm for which it is critical to maintain business continuity or always stays in touch with customers should implement solutions that protect against DDoS attacks and their consequences. Protection against DDoS attacks has become as important as protection of IT resources against hackers and computer viruses.
Even a minor attack, if properly prepared, individually adjusted, can cause damage.
Vast majority of attacks are carried out botnets that do not analyze the enterprise's data or the potential benefits of blocking the site, so absolutely any business may be the victim of hackers.
It is never possible to predict when an attack will take place, or when it will end. And the longer it lasts, the greater the loss of the attacked company.