DDoS protection

High volume layer 3 and 4 DDoS protection with advanced layer 7 features included. The self service web portal with integrated API functionality will offer users the best possible infrastructure BGP DDoS protection.

Terabit-Level DDoS protection to protect an unlimited amount IP subnets. This high volume DDoS protection cloud service will cover any kind of DDoS attack for a fixed fee without any hidden cost afterwards.

Protect your remote IP infrastructure

The Serverius DDoS protection is cloud based protection system to create, protect and control your own datacenter environment.

 

ddos protection - web application firewall

Configurable technology at your fingertips

The only person who knows which services are running on its IP subnets is the network IP administrator. Based on what is running on a IP subnet, he should be able to create it’s own DDoS protection defense layer for it. Therefore Serverius its self service web portal offers tunable features to configure everything yourself.

Custom made IP security

Users can create a personalized protection environment called Safe Zones. Every Safe Zone can hold one or multiple IPv4  (up to a /32 up to a /19) and IPv6 subnets where multiple security feature can be enabled. This way the user can create specific configuration per IP, per software application, per Web Application.

The most important layer is the “baseline” protection layer (see image next to this text) where you can set all possible checks for TCP/UDP/ICMP/DNS/SIP/HTTP/HTTPS and other type of data traffic and protocols.

customized DDOS protection

Include & exclude IP subnets

When you are using the Serverius DDoS protection to protect your private IP infrastructure, you can forward all data traffic transparently and enable protection for smaller subnets like a /32 single IP address. It’s even possible to exclude IP subnets from larger subnets.

Attack packet capture

When you are under attack you can capture packets and download them as .pcap files. This will help you to evaluate your attacks and make your protection layer even better.

Geographically IP blocking.

A location policy can permit, block, or implement traffic limiting for traffic of a country or a region.

Many attacks on the Internet are launched by attacks by controlling zombie hosts. These zombie hosts may be centrally located in a specific region. A location policy can block or implement traffic limiting by region, effectively prevents attacks from a specific region. In addition, a location policy can take the pass action on traffic from a trusted region.

Also, if you want to allow only one or more countries you can block all countries and allow only the countries you prefer.

Filters (firewall rules)

Filters are like firewall rules, they will allow users to adjust their security layer to their IP subnets. It can block or rate limit data traffic like firewall rules. As a result it will make a Safe Zones even more personal. Mostly it’s used to block specific types of data traffic and it’s the essential tool-set to win the play of cat and mouse attacks.

Self learning user baseline

To achieve best possible protection level and to avoid any false positive, all configuration thresholds should be periodically tuned to match the safe zone traffic. Therefore the user specific thresholds can automatically be tuned by the “baseline learning mode”. The system will analyze the traffic of the safe zone for a period of time and will adjust the thresholds based on the analytic results.

Note: when a defense is enabled the protection system will only collect statistics on the traffic and will activate the defense mechanism only in case the traffic exceeds the threshold.

Learning Cycle (Days) : This value indicates the period of time for each learning cycle. The learning result is applied to the defense policy only after such a learning cycle ends.

Value Is Larger Than the Current Value the system automatically applies baseline learning results to defense policies once the learning cycle ends if the recommended value is larger than the current value.

IP reputation protection

Tracking of most active 5 million zombies and automatic daily update of the IP reputation database to rapidly block attacks; local access IP reputation learning to create dynamic IP reputation based on local service sessions, rapidly forward service access traffic, and enhance user experience.

Attack signature database

RUDY, slowhttptest, slowloris, LOIC, AnonCannon, RefRef, ApacheKill, and ApacheBench attack signature databases; automatic weekly update of these signature databases

Full featured rest API

ddos protection api Almost all functions of the Cybersecurity portfolio are available by API. Therefore users have the ability to automate their protection and integrate it into their own client environments. More at: api.serverius.net

Connect by GRE tunnel to protect your remote datacenter

Remote DDoS protection can be established by GRE tunnel. This way you can connect and protect your own data center network infrastructure. Incoming data-traffic will first passes through Serverius and will be inspected. Only cleaned data-traffic will be sent back to your network by GRE tunnel.

Redundant & multiple GRE connections

You can use multiple GRE tunnels. Normally a redundant setup will use two GRE tunnels to different Serverius routers. Both in different physical Serverius datacenter facilities. If you have redundant routers yourself you can connect all of them with redundant GRE tunnels. Even if you use multiple datacenters, all your routes can be connected using only one Cybersecurity package.

DDoS protection by GRE tunnel

Note: BGP Layer 3 users can also use their GRE tunnel as a BGP IP transit uplink. Simply by announcing their IP subnets without enabling their IP subnets for DDoS protection. And in case of a DDoS attack, the IP protection can be simply enabled with a single mouse click or API call.