DDoS attack and protection

A DDoS (Distributed Denial-of-Service) attack is used by criminals to attack computers from a hacked computer.

What are the risks of a DDoS Attack?

We can distinguish between the following attack techniques:

  • Buffer overflow attacks – The most common DoS attack. The idea is to send more traffic to the network than the network was built for.
  • ICMP flood – Takes advantage of network devices that are not properly configured by sending spoofed packets that “ping” every computer on the network instead of one specific system.
  • SYN flood – sends a request to connect to a server but never ends the “handshake”. This request will continue until all open ports are overloaded with requests with no legitimate users present to connect to.

How can you protect yourself against a DDoS attack?

Due to the unique characteristics of a DDoS attack, additional techniques and processes are required to counter a truly serious and often coordinated attack:

  • Use perimeter security such as a Next Generation Firewall
  • Use a Load balancer with built-in security features
  • Make good, clear agreements with your service provider

24 hours a day, 365 days a year

IT Support

Our IT support is excellently organized. Our employees are available 365 days a year, 24 hours a day, 7 days a week.

en_USEN