Frequently Asked Questions

DDoS Service
Last Updated 3 years ago

We offer Layer 5 and 7 DDoS protection for your site or server. We will assign you a DDoS protected IP that you can use instead of the IP assigned to your server as well as the port number you are using.

We support several major applications such as:

MMORPG; Minecraft, Lineage II, Kal Online
Chat software
General websites and PHP sites; HTTP and TCP.
(Please note, camfrog we are not able to provide DDoS services for.)

We help prevent various types of Layer 7 Floods including:

UDP Flood
TCP Flood
SYN Flood
Reflection Flood

TCP SYN Flood Attacks
This type of attack involves “flooding” a certain port. The attacker sends out multiple SYN requests (“synchronize” packets) and is the first thing sent via a TCP (Transmission Control Protocol) connection. The DDoS affect happens when the attacker does not respond with an ACK code which is what the server is waiting for and the attacker keeps sending SYN requests creating more unopened connections and consuming too many server resources. Packet filtering firewalls can help somewhat by blocking these SYN packet attacks.

  • User Datagram Protocol is used in the Domain Name System, streaming media, voice-over-IP and online games. UDP flood attacks involve attacking a specific IP address with a large number of UDP packets. This forces the dedicated server to keep listening on these random ports, seeing that no application listens at that port and having to reply with an unreachable packet; ICMP (Internet Control Message Protocol) each time. This results in the server being over burdened with sending these requests and not able to handle legitimate requests on top of that. The attacker can also spoof their IP address.
  • There are instances where there may appear to be a DDoS attack, however, in many cases this is simply due to a large spike in traffic. Not every time the dedicated server or network slows down does it mean an attack is occurring. Reasons for this can be as simple as a link from a very popular web site linking to your site and sending a flood of visitors.
  • There are unfortunately many ways for anyone to obtain DDoS “software” and attack virtually anyone. However, this can also be a useful tool for a server administrator in determining your own DDoS defenses. Obviously this would need to be tested on a very low traffic day or a test server to determine how your defenses hold up against a DDoS attack that you instigate. How quickly did it work and were legitimate connections being denied? It is advisable that all dedicated server administrators test their defenses so they know what to expect, how it can be handled and the steps involved.

Please Wait!

Please wait... it will take a second!