And using anycast for protected IP addresses allows us to process requests at the scrubbing node that is closest to the site visitor. That's why we process web traffic on our nodes located around the world. To effectively protect sites from application level DDoS attacks, the servers that process HTTP requests must be protected from network DDoS attacks. If an HTTP request is considered suspicious, a successful check will ensure that the visitor will be able to access the site. This allows us to provide protection that works transparently for most real site visitors. Protection is always active, with additional checks applied only to suspicious requests. Based on the checks and evaluations, we decide if there are DDoS or other attacks on the domain and block the attacking requests. In addition, requests are checked for compliance with RFC requirements and some other parameters. We evaluate all HTTP requests to protected domains using proprietary software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |