Are you under attack? We are here 24x7x365

Our Approach

We can protect your entire business infrastructure against all types of threats

Proxy Protection

The first step in our approach is to immediately protect your website DNS, because that becomes the 1st point of failure in case attack targets the DNS cluster. Our proxy protection makes sure that your website goes behind our protected network, so it’s public IP is not exposed. By anonymizing the IP, we are adding an additional layer of security which the attacker needs to crack.

Learn More

Website Protection

Our second layer of protection is to directly protect your website from all cyber attacks, including Application Layer 7 attacks. We use Web Application Firewall (WAF) to provide this kind of DDoS attack. The WAF itself is able to cover majority of the cyber attacks including OWASP Top10 vulnerabilities (SQL Injection, XML External Entries XXE, Cross Site Scripting XSS, Insecure Deserialization, Broken Access Control etc.), protection against Zero Day Vulnerability, fulfilling PCI DSS Compliance requirement 6.6, Threat Blocking and Privacy Features.

Learn More

Server Protection

Our third layer of protection is to directly protect your server infrastructure from all kinds of DDoS attacks. Featuring network layer protection, the server encompasses all aspects. Our server is provisioned on a secure network with 100% DDoS Protection. We offer a wide variety of servers ranging from Entry level series to Powerful multi-core processors, with SSD storage, redundant network and full server management.

Learn More

Case Study: Middle East Airlines

A comprehensive case study on how BlockDoS was able to protect Lebanon Airline from complex DDoS attacks.

Download Now

DDoS Protection Overview

Website Performance, Reliability and Availability through Unlimited DDoS Protection

According to a research by CDNetworks, more than 54% of businesses were victim of DDoS Attacks in 2017 and even greater number is at risk in 2018. By leveraging on the vulnerabilities within hundreds and thousands of of insecure IoT (Internet of Things) devices, the creation of botnets and subsequent large-scale volumetric attacks is easier and more impactful than ever before. Besides massive scale DDoS Attacks, the focus of attacks is rapidly moving from network & transport layer to application layer 7 where the attacks are way more complex. This means that taking an application or a website offline would require lesser bandwidth and fewer resources resulting in greater disruption and impact on operations. DDoS attacks are able to hamper standard business operations by negatively affecting website availability and performance, sometimes even completely taking them offline. On average, the hourly cost of downtime due to network infrastructure failure is more than USD 100K/hr. One of the obvious side affect of similar attacks is loss of brand reputation, business and customers. In order to combat these complex, massively disruptive attacks, an intelligent, AI-powered scalable network is required which can combat every new type of attack. BlockDoS achieves this by using a global network with more than 150+ PoPs, data-driven intelligence to combat vulnerabilities and exploits and proven scalable unlimited DDoS protection.

Are you under attack? We are here 24x7x365

Common Type of DDoS Attacks

Network Layer Attack (Layer 3)

A common type of Network Layer attack is "ICMP Flood" whereby attacker takes down the system through repeated "pings" (ICMP echo requests).

Transport Layer Attack (Layer 4)

The most common attack in Transport Layer is "UDP Flood Attack" which involves a taking down target server with UDP requests from large number of computer systems.

Session (Layer 5) & Presentation Layer Attack (Layer 6)

One of the most common Presentation Layer attack is "SSL exhaustion" whereby a large number of requests are sent to target host to force server to perform resource extensive process for setting up secure sessions.

Application Layer Attack (Layer 7)

A popular Application Layer Attack is "Slowloris" which involves sending a large number of simultaneous requests to target server timed carefully to avoid timeout thereby not leaving room for legitimate requests.

DDoS Attack Glossary

A thorough glossary which covers popular DDoS attacks and their mode of action
LAYER 3 - Network
ICMP Flood
ICMP Fragmentation
BGP Hijacking
LAYER 4 - Transport
IPSec Flood
UDP Flood
SYN Flood
LAYER 5 – Session / LAYER 6 - Presentation
SSL Exhaustion
Long Lived TCP sessions
DNS query floods
LAYER 7 - Application
Slow Post
Slow Read
HTTP/S Flood
CVE Attack Vectors
Layer 7 protocol floods (SMTP, DNS, SNMP, FTP, SIP)
Database Connection Pool Exhaustion
Resource Exhaustion
Large Payload POST requests
Mimicked user browsing

Are you under attack? We are here 24x7x365

Frequently Asked Questions

1What is a DDoS attack?
To begin with, DDoS stands for Distributed Denial of Services. A DDoS attack is an attempt, made by hackers and cybercriminals, to overflow a network with malicious data. Multiple requests are sent to the network so that the website’s capacity to handle simultaneous requests is exceeded. This renders the website unavailable for its target audience.
2How does DDoS protection work?
The basic principle of DDoS protection is to deny access to any malicious traffic heading towards your website. DDos protection works by using algorithms and dedicated softwares to monitor all incoming traffic. Traffic deemed illegitimate is denied access, while the legitimate traffic continues to flow smoothly.
3How much protection does your site need?
The amount of protection required by your website depends on its size and the amount of incoming traffic. For smaller websites, basic protection options, which can protect against attacks up to 10 gigabytes per second, are sufficient. For larger websites however, advanced protection options are necessary as they can defend against attacks ranging up to 100 gigabytes per second.
4What is the goal of a DDoS attack?
DDoS attacks are carried out with the intent of disrupting a website’s functionality. This will result in a damaged reputation, deterioration of relationships with existing clients, and financial loss. The ultimate goal for a DDoS attack can be to shut down the website altogether.
5What are the three types of DDoS attacks?
Broadly speaking, DDoS attacks can be categorized into three major types. Volume based attacks, protocol attacks, and Application layer attacks. Volume based attacks are dedicated towards saturating the bandwidth of the attacked website. Protocol attacks are focused on exploiting website resources. Application layer attacks are aimed at web applications. These attacks exploit any weaknesses in the application and render it unable to deliver any content to its users.
6Why are signature based strategies not working anymore?
Signature based strategies are considered ineffective due to two major reasons. One, they can only detect known threats, which means no protection against new attacks. Secondly, they can be passed easily by hackers. Just by applying some simple tweaks to some character of a header or payload, a hacker can pass through any defenders relying solely on signature based technology .