DDoS Attack Severity

In the world of application-driven business, DDoS attacks have become an especially worrisome tool of cybercriminals. When anyone can launch DDoS for a few bucks, it is not surprising that they are growing in numbers, frequency and scale rapidly. How to keep important systems always available for business? By using DDoSING NETWORK's modern flow monitoring technology and fighting DDoS as close to the attack source as possible to solve your problem.

DDoS Evolving Trend

The history of DDoS attacks stretches back 24 years, with the first registered incident occurring in 1974 when a 13 year old student used a simple “ext” command to temporarily lock up terminals at a University of Illinois laboratory. With the rise of the World Wide Web in the 1990’s, Internet Relay Chat (IRC) floods were used to force administrators to log off from a channel, allowing the attacker to take over and establish administrator privileges for themselves. In the late 90’s and early 2000’s more sophisticated tools began to emerge, providing the model foundation for future DDoS attacks. The Trinoo tool allowed attackers to take over a few computers with a wide network, creating a chain reaction of service denial that became known as a User Datagram Protocol (UDP) flood, with unsuspecting users participating in the attack. Other tools like “Shaft” and “Omega” would allow hackers to track the performance of their attack, allowing them to adjust tactics more effectively. Through the emergence of new methods and with the refinement of old techniques, hackers have kept up to speed with the fast-paced technological advances of recent times. Botnets, such as the famous Mirai botnet that attacked Dyn, are capable of leveraging thousands of devices to cause malware-induced system crashes. Storing systems known as memcache servers, are designed to speed up websites, and up to 100,000 of them are available for public use on the internet. In recent attacks however, hackers have also used these servers to increase the intensity of their attacks by magnifying data packets to overflow websites with information requests. Unfortunately for victims, it’s common for DDoS attacks to be accompanied by financial demands.


High-Capacity Bandwidth

We join in Internet by more than 1000Gbps bandwidth, this can  accommodate most Brute-force DDoS attack. By retaining ownership and control of your IP architecture by hosting and routing data across the network with a point-to-point circuit, you build flexibility into your business. We also can offer up to 10Gbps Dedicated Server to meet your business needs.

Traffic cleaning

DDoSING NETWORK traffic cleaning solution have three parts, Detecting Center, Cleaning Center, and Management center.
  • Detecting Center: Acting like the "eyes" of the solution, the detecting center monitors traffic based on certain detection policies and reports abnormalities to the management center.
  • Cleaning center: Acting like the "heart" of the solution, the cleaning center receives instructions from the management center and cleans abnormal traffic based on traffic diversion policies.
  • Management center: Acting like the "brain" of the solution, the management center formulates detecting and cleaning policies, controls detecting and cleaning devices, and generates attack reports and cleaning logs.


     Support for the necessary protocols:
  • HTTP/2

    Support for HTTP/2 protocol as a default option. It works in browsers only for HTTPS requests.

  • SSL

    Support for a verification certificate to provide confidential communication between client and server. You can use your own SSL certificate.

    Content security:
  • Access policies

    By countries, by domains, by IP addresses, by client applications.

  • HTTP methods

    By default, the following methods are allowed and available: GET, HEAD, POST, PUT, PATCH, DELETE, OPTIONS.

  • HTTP header

    Content protection against downloading by third-party sites or applications by adding the Access-Control-Allow-Origin header only to allowed domains.

  • Secure token (tokenized URL)

    Content protection against unwanted downloads via token.

Anti-DDoS Device

We have professional Anti-DDoS Device to protect our autonomous system from being attack. In general, the SYN flood, ACK&RST flood, UDP flood, ICMP flood, and normal CC attack, our Anti-DDoS device can defense automatically.