ArborNet Protector protection system

 

About the ArborNet Protector protection system available to Hostico clients, the attack mitigation method, and a description of DDoS (Distributed Denial of Service) attacks.

Hostico / blogby Cristian Pop
DDoS Protection

ArborNet Protector

Due to the location of Hostico servers in one of the most performant and professional data centers in the world, namely GTS Telecom, Hostico web hosting clients benefit from cutting-edge equipment. Other advantages include the location of the data center in Bucharest, Romania, and the direct connection with the other GTS Telecom data centers worldwide.

Protection equipment is not limited to server applications. Hostico benefits from specially designed protection equipment to mitigate Distributed Denial of Service (DDoS) attacks. Regarding DDoS attacks, the latest solution offered in this regard is the ArborNet protection systems, which are now available to Hostico customers as well.

About DDoS

The DDoS attack is an attempt to overload the resources or network of a device in order to disrupt the communication of the device with its users.
Distributed Denial of Service (DDoS) represents the simultaneous action of several external systems sending requests that require an exponential response from the target system, thus causing the services offered by the target system to be unusable within ideal parameters by its legitimate users.

Flooding the target system with requests from multiple sources leads to overloading of the services/network and often to the inability to cope with them. The solution offered by ArborNet in this case is the detection of illegitimate traffic and its mitigation without obstructing legitimate traffic. The Arbor system has the ability to automatically identify such attacks in real-time and to block them, ensuring the continuity of activities without interruptions.
The Arbor Protector system protects against several types of attacks that consume a lot of bandwidth on 'network layer' protocols, such as TCP or UDP floods, up to those that are less bandwidth-consuming but generate an overload of resources allocated to a service at the 'application layer', e.g.: HTTP, DNS, FTP or VoIP.

Hostico / blogPublished on 10-02-2011