1Tbps Anti-DDoS that Works with Any Application, Anti DDoS for your business

Every single IP that receives traffic from Internet through Alistaro may be protected against any type of DDoS attack:

Service provided by our partners Voxility.

A network sensor detects instantly when an attack occurs and redirects traffic in seconds from the affected IP to the mitigation cloud. Redirection stops within minutes after the attack ends.

How does it work?

The sensors detects attacks everywhere in the network. When a suspicious pattern is detected, traffic toward that IP is redirected for mitigation in the same datacenter Security Cloud.

anti ddos protection for your business

anti ddos

anti ddos protection for your business

anti ddos

In very rare cases, inbound capacity of a single Security Cloud might be overwhelmed and it triggers automatically a global “hijacking” of the attacked IP in some, if not all Voxility Security Clouds.

The process of detecting, filtering and hijacking is completely automated and it is so fast that it seems to be in real-time.

Types of DDoS attacks filtered

• DDoS attacks filtering 80%. This filtering capability is agreed for the following threats:

• IP non-existing protocol attack such as Flood with IP packets with reserved values in protocol field.

• Attack with fragments such as sending mangled IP fragments with overlapping, over-sized payloads to the target machine.

• ICMP attacks such as: ICMP Flood, Smack, Smurf attack (OBSOLETE).

• IGMP attacks such as: IGMP flood.

• TCP attacks such as: SYN Flood, SYN-ACK Flood, ACK Flood, FIN Flood, RST Flood, TCP ECE Flood, TCP NULL Flood, TCP Erroneous Flags Flood, TCP Xmas, Fake Session, SRC IP Same as DST IP.

• UDP attacks such as: General Random UDP Floods, Fraggle, DNS query, DNS Amplification (+DNSSEC), NTP Amplification, SNMPv2, NetBIOS, SDP, CharGEN, QOTD, BitTorrent, Kad, Quake Network Protocol, Steam Protocol.

• HTTP attacks such as: Slowloris (Apache / IIS Attack), R-U-Dead-Yet (RUDY), HTTP Object Request Flood.

• Other category attacks such as: Misused Application Attack, Slow Read attack.

DDoS protection modes:

1. Sensor mode:

• a. with Layer 7 filtering

• b. without Layer 7 filtering

How sensor mode works?

If there is no attack tergeting your Ip address, the traffic flows directly to your equipment as in normal mode of operation.

Voxility has sensors to detect attacks everywhere in the network. When a suspicious pattern is detected, traffic toward that IP is redirected for mitigation in the same datacenter Security Cloud.

The network sensors detects instantly when an attack occurs and redirects traffic in seconds from the affected IP to the mitigation cloud.

Redirection stops within minutes after the attack ends.

2. Always ON mode:

• a. with Layer 7 filtering

• b. without Layer 7 filtering

How Always on mode works?

Instead of permitting traffic to flow directly toward you server, this protection mode permanently applies the anti-ddos filters. Basically, the traffic flows permanently through the Voxility Security Cloud as in the scheme below.

3. OFF

How Layer 7 filtering works?

At the moment layer 7 filtering applies only for web services (TCP traffic on destination ports: 80, 443, 2078, 2083, 2087, 2095, 2096). Basically the ddos protection runs as a reverse proxy for the mentioned ports.

Therefore, to answer your question, Layer 7 works with HTTP and HTTPS.

By visiting and using this website you agree to the placement of cookies. 

This page describes our cookie policy for our website alistaro.com If you do not accept this Cookie Policy please do not use this site.

What are cookies?
For almost any modern website to work properly, it needs to collect certain basic information on its users. To do this, a site will create files known as cookies – which are small text files – on its users’ computers. These cookies are designed to allow the website to recognise its users on subsequent visits, or to authorise other designated websites to recognise these users for a particular purpose.

Find out more.