Are you under attack? We are here 24x7x365

Our Approach

We can protect your entire business infrastructure against all types of threats

Proxy Protection

The first step in our approach is to immediately protect your website DNS, because that becomes the 1st point of failure in case attack targets the DNS cluster. Our proxy protection makes sure that your website goes behind our protected network, so it’s public IP is not exposed. By anonymizing the IP, we are adding an additional layer of security which the attacker needs to crack.

Learn More

Website Protection

Our second layer of protection is to directly protect your website from all cyber attacks, including Application Layer 7 attacks. We use Web Application Firewall (WAF) to provide this kind of DDoS attack. The WAF itself is able to cover majority of the cyber attacks including OWASP Top10 vulnerabilities (SQL Injection, XML External Entries XXE, Cross Site Scripting XSS, Insecure Deserialization, Broken Access Control etc.), protection against Zero Day Vulnerability, fulfilling PCI DSS Compliance requirement 6.6, Threat Blocking and Privacy Features.

Learn More

Server Protection

Our third layer of protection is to directly protect your server infrastructure from all kinds of DDoS attacks. Featuring network layer protection, the server encompasses all aspects. Our server is provisioned on a secure network with 100% DDoS Protection. We offer a wide variety of servers ranging from Entry level series to Powerful multi-core processors, with SSD storage, redundant network and full server management.

Learn More

Case Study: Middle East Airlines

A comprehensive case study on how BlockDoS was able to protect Lebanon Airline from complex DDoS attacks.

Download Now

DDoS Protection Overview

Website Performance, Reliability and Availability through Unlimited DDoS Protection

According to a research by CDNetworks, more than 54% of businesses were victim of DDoS Attacks in 2017 and even greater number is at risk in 2018. By leveraging on the vulnerabilities within hundreds and thousands of of insecure IoT (Internet of Things) devices, the creation of botnets and subsequent large-scale volumetric attacks is easier and more impactful than ever before. Besides massive scale DDoS Attacks, the focus of attacks is rapidly moving from network & transport layer to application layer 7 where the attacks are way more complex. This means that taking an application or a website offline would require lesser bandwidth and fewer resources resulting in greater disruption and impact on operations. DDoS attacks are able to hamper standard business operations by negatively affecting website availability and performance, sometimes even completely taking them offline. On average, the hourly cost of downtime due to network infrastructure failure is more than USD 100K/hr. One of the obvious side affect of similar attacks is loss of brand reputation, business and customers. In order to combat these complex, massively disruptive attacks, an intelligent, AI-powered scalable network is required which can combat every new type of attack. BlockDoS achieves this by using a global network with more than 150+ PoPs, data-driven intelligence to combat vulnerabilities and exploits and proven scalable unlimited DDoS protection.

Are you under attack? We are here 24x7x365

Common Type of DDoS Attacks

Network Layer Attack (Layer 3)

A common type of Network Layer attack is "ICMP Flood" whereby attacker takes down the system through repeated "pings" (ICMP echo requests).

Transport Layer Attack (Layer 4)

The most common attack in Transport Layer is "UDP Flood Attack" which involves a taking down target server with UDP requests from large number of computer systems.

Session (Layer 5) & Presentation Layer Attack (Layer 6)

One of the most common Presentation Layer attack is "SSL exhaustion" whereby a large number of requests are sent to target host to force server to perform resource extensive process for setting up secure sessions.

Application Layer Attack (Layer 7)

A popular Application Layer Attack is "Slowloris" which involves sending a large number of simultaneous requests to target server timed carefully to avoid timeout thereby not leaving room for legitimate requests.

DDoS Attack Glossary

A thorough glossary which covers popular DDoS attacks and their mode of action
LAYER 3 - Network
ICMP Flood
ICMP Fragmentation
BGP Hijacking
LAYER 4 - Transport
IPSec Flood
UDP Flood
SYN Flood
LAYER 5 – Session / LAYER 6 - Presentation
SSL Exhaustion
Long Lived TCP sessions
DNS query floods
LAYER 7 - Application
Slow Post
Slow Read
HTTP/S Flood
CVE Attack Vectors
Layer 7 protocol floods (SMTP, DNS, SNMP, FTP, SIP)
Database Connection Pool Exhaustion
Resource Exhaustion
Large Payload POST requests
Mimicked user browsing

Are you under attack? We are here 24x7x365