IP ServerOne DDoS Protection

  • First-grade Mitigation System

    Today’s DDoS attacks are growing in size, frequency, and complexity where no enterprise is immune to these threats. IPServerOne’s DDoS Mitigation provides you with network-based, "Always-On" protection and with the assurance of 24x7 monitoring.
    Up-to 500Gbps of attack mitigation capacity
    In-house filtering for no added latency
    Automated and "Always On" protection
    Completely transparent to regular traffic
    Both local and international mitigations
    Prevent service disruption during attacks
    Protection against any kind of attack
    Having a detailed report after any attack
    Advanced behavioral analytics technology
    Multi-level DDoS protection to ensure service availability
    Local Mitigation Pricing
    SGD 200++ / month SGD360++
    SGD 280++ / month SGD520++
    SGD 360++ / month SGD680++

    Need More details?

    Live chat with a hosting infrastructure specialist now

    IPServerOne Mitigation System

    Anti-DDoS Diagram

    A smart and high-performance DDoS mitigation device has been deployed which is able to detect and mitigate immediately; it monitors all the incoming traffics to our network and as soon as a suspicious traffic hits, it will be flagged and sent to our own Anti-DDoS infrastructure system automatically with reporting data and analytics. The process of detecting and filtering the traffic is completely automated and on the spot that it feels to be in real-time.

    DDoS Mitigation Flow

    Multi-layered mitigation in global scrubbing centers

    We protect your network against all kinds of DDoS Attacks; a multi-layered mitigation mechanism is being used to identify, mitigate, and analyze attacks on the spot. Any attack goes through our 7 layered mitigation system to assure it will not reach to our customers’ network, where 99.9% of attacks will be mitigated. IPServerOne's first-grade mitigation system, after passing any kinds of attack from its 7 layers protection, will route the clean traffic to the customer’s network.

  • Toggle
    Local Mitigation Pricing
    SGD 499++ / month MYR899++
    SGD 699++ / month MYR1299++
    SGD 899++ / month MYR1699++

    What is a DDoS?

    A Distributed Denial of Service (DDoS) attack is designed to prevent or degrade services provided by a server at a given Internet Protocol (IP) address. These attacks often threaten the availability of both network and application resources. The idea behind a DDoS is to generate dummy traffic by flooding more than what the receiving site can deal with.

    What are the impacts of DDoS attacks?

    DDoS attacks result in loss of revenue, loss of customers, damage to brand and theft of vital data. The impact of a successful DDoS attack is widespread. Site performance is severely compromised, resulting in frustrated customers and other users. Service-level agreements (SLAs) are violated, triggering costly service credits.

    What industry is most often affected by DDoS attacks?

    Whether you are the owner of a large enterprise, a small business, an e-commerce company or a government institution; if your business is the internet related, it can easily be a potential target where no industry is completely immune to these attacks.

    What are the different types of DDoS attacks?
    Volumetric Based Attacks
    These attacks are characterized by the presence of an abnormal and overwhelming number of packets on the network.
    Application Based Attacks
    They are designed to exploit weaknesses or software defects that exist in the protocols and applications themselves.
    Bandwidth Attacks
    These DDoS attacks consume resources such as network bandwidth or equipment by overwhelming them with a high volume of packets.
    Hybrid Attacks
    Modern DDoS attacks are very sophisticated and often blend several volumetric and application based attacks in order to disrupt service.

    DDoS Attack Mitigation

    DDoS mitigation services downgrade the impact of DDoS attacks on customer infrastructure by detecting and re-routing all the dummy traffic before it ever reaches to the aimed server. This service essentially adds a barrier between outside sources and web servers by redirecting traffic that appears to be malicious or attacking in nature to international scrubbing centres.


    DDos Attack Levels:

    Name of attack OSI level Type of attack Explanation of the attack principle
    ICMP Echo Request Flood L3 Resource Also called Ping Flood, mass sending of packets implicating the response of the victim, which has the same conten as the original packet.
    IP Packet Fragment Attack L3 Resource Sending of IP packets that voluntarily reference other packets that will never be sent, which saturates the victim's memory.
    SMURF L3 Bandwidth ICMP broadcast attack usurping the source address to redirect multiple responses to the victim
    ICMP Flood L3 Resource Mass sending of IGMP packets (multi-cast management protocol)
    Ping of Death L3 Exploit Sending of ICMP packet which exploit an implementations bug in certain operating systems
    TCP SYN Flood L4 Resource Mass sending of TCP connections requests
    TCP Spoofed SYN Flood L4 Resource Mass sendig of TCP connections requests to usurp the source address
    TCP SYN ACK Reflection Flood L4 Bandwidth Mass sending of TCP connections requests to a large number of machines, usurping the victim's source address. The bandwidth of the victim will be saturated by the responses to these requests.
    TCP ACK Flood L4 Resource Mass sending of TCP segment delivery receipts
    TCP Fragmented Attack L4 Resource Sending of TCP segments that voluntarily reference other segments that will never be sent, which saturates the victim's memory
    UDP Flood L4 Bandwidth Mass sending of UDP packets (not requiring a previously established connection)
    UDP Fragment Flood L4 Resource Sending of UDP datagrams that voluntarily reference other datagrams that will never be sent, which saturates the victim's memory
    Distributed DBS Amplification Attack Bandwidth L7 Mass sending of DNS requests usurping the source address of the victim, to a large number of legitimate servers. As the response is more voluminous that the question, an amplification of the attack follows
    DNS Flood L7 Resource Attack of a DNS server by mass sending of requests
    HTTP(S) GET/POST Flood L7 Resource Attack of a web server by mass sending of requests
    DDoS DNS L7 Resource Attack of a DNS server by mass sending of requests from a large set of machines which are under the attacker's control


Back to Top