Home / Enterprise Services / DDoS Protection
Distributed Denial of Service (DDoS) Protection
What is a distributed denial-of-service (DDoS) attack?
DDoS, short for Distributed Denial of Service, is a type of DoS attack where multiple (often compromised) systems are used to target a single system as part of a Denial of Service (DoS) attack. The fact that there are multiple systems in many locations constitutes the Distributed part of the picture. Attacks of this nature are designed to bring network services to their knees by flooding target systems with useless traffic.
Constant® Hosting DDoS Protection: How it works
Overview
Constant® Hosting Hosting DDoS Protection works by dynamically routing traffic to your server when an attack is detected. ‘Bad’ traffic is filtered while clean traffic is able to reach your servers. We use Interior Border Gateway Protocol (iBGP) to intercept traffic and Generic Routing Encapsulation (GRE) tunneling to deliver clean traffic back to hosted solutions.
Detection
Traffic on our network is automatically monitored for anomalies 24/7/365 using sFlow sampling collectors in our Attack Detection System (ADS). This monitoring method allows us to passively monitor traffic while maintaining optimal routing for your solution under normal (attack-free/quiet) periods. Attack detection is fully automated based on proprietary detection algorithms, which our in-house engineers update, fine-tune and improve to deliver cutting edge DDoS protection. The typical time for ADS to qualify an attack is under a minute, and traffic is fully re-routed within seconds of qualification.
Filtering
When a DDoS Attack is detected, incoming traffic is re-routed to our Attack Mitigation Farm (AMF). The incoming capacity into the AMF is significant and growing. The AMF is automatically and instantly programmed with rules that are learned from the ADS based on specific attributes of the then-current attack. Clean traffic is utilizes GRE tunneling to the switchs where your servers are physically connected. This is the same technology as other, publicly-traded DDoS Mitigation providers use, however our technology exists wholly inside our datacenters so no packets ever leave our premium low-latency network as one might typically encounter with a 3rd party DDoS Mitigation service provider.
Monitoring
Our Engineers have extensive monitoring tools. The Customer interface located at https://my.constant.com includes a dashboard to assist you with visualizing attacks and mitigation efforts..
Frequently Asked Questions
Does this block both TCP and UDP Traffic?
Yes.
We bought the 1 GBPS plan and our attack size is 2 GBPS? What happens if we suffer an attack larger than the Protection we have purchased?
If the incoming bandwidth dramatically exceeds your purchased plan, we will notify you to suggest an upgrade. If you choose not to upgrade, the DDoS Mitigation service will automatically de-activate during future attacks upon reaching the bandwidth threshold.
Are you using any 3rd Party hardware for DDoS Protection? No. All systems for Monitoring and Mitigation have been created by our engineering team.
Do you offer a Control Panel where we can see details regarding attacks on our server?
While this feature is under development, basic reports may be available upon request. Please do so as quickly as possible as log retention is brief.
Will the support team available 24/7 while there is any major attack with DDoS?
Our support team is always available 24/7.
Does your company provide multiple DDoS plans on single server?
Yes. Please discuss options and pricing with any account executive.
Constant.com Advantages:
Have Questions about Enterprise Hosting?
Live Chat Contact Us
100% Uptime
1000+ Gbps capacity
24x7x365 Support


Follow us on Twitter for News & Specials!
© 2017 Constant® Hosting, LLC, All rights reserved. Terms of Service | DMCA Policy | Privacy Policy