DoS Attacks

Denial-of-service attacks (DoS) are the easiest to detect. The purpose of this type of attack is to stop the service. Unfortunately, one device is enough for the attacker to make access to the website completely inaccessible (e.g. - Slowloris attack).

domain@1x-e1682086444842

Get rid of customer complaints that don't end now!

Enjoy speed, strength, security and advanced management of cloud servers from Cloud Coden

DoS Attacks

About DoS Attacks

When DoS attack happens: the system slows down, the server loads up, websites don’t load, and the server can crash completely. While DoS is more visible on HTTP (S), hackers also target other protocols, including FTP, SSH, IMAP, POP3 and SMTP.

Problems

  • High pressure on the server

  • Use high memory

  • Decrease in service and inaccessible server

How do we differ in DoS detection solutions?

Detection force DoS in Cloud Codeine

Cloud Coden constantly monitors the number of connections on your server. If too many simultaneous connections are detected, Host’s life will automatically add the IP address to the 60-second blacklist to make sure all communications are blocked from the attacker’s IP.

After that, the IP address will be placed in the grey list, so that authorized users can delete the IP address if it is a real login. Cloud Coden DoS Detection also works alongside our AntiFlood module. When there are repeated attempts to discontinue the service, the IP address will be blacklisted for a longer period of time.

The virtual process (80 active connections at the same time) ensures a low false positive rate and effectively prevents DoS attacks that can be configured on each port, as well as incoming and outgoing communications.

Cloud Code CAPTCHA page is also protected against DoS attacks and requires minimal resources to run the CAPTCHA service.

Common Questions for DoS Attacks

Technical Support 24/7

How many connections from a single IP address will block it?

When the 80 IP address exceeds an active connection at the same time, the attacker’s IP address will automatically be blacklisted. After 60 seconds, the IP address will be placed in the grey list, so that authorized users can delete it. You can configure blocking for each port and for incoming and outgoing connections as well.

Does Cloud Coden DoS detect distributed denial of service (DDoS) attacks as well?

Network layered DDoS (SYN flood, ICMP flow, UDP flow) are designed to overcome network devices and this server-side attack cannot be blocked. However, Cloud Codin provides indirect protection against DDoS. By constantly updating our global list of harmful IP addresses, most Android networks have already been blocked by Cloud Coden. The same IP addresses of Android networks are usually used to launch DDoS attacks, so our system will automatically block their requests.

What ports prevent Cloud Coden DoS Detection attacks?

DoS attacks on several protocols: HTTP, FTP, POP3, IMAP and any other DoS based on TCP protocol. By default, the following ports are monitored: 80 (HTTP), 25 (SMTP), 53 (DNS) and 22 (SSH). You can also customize ports in unit configuration.

What happens when Cloud Coden detects a DoS attack?

The attacker’s IP address is blacklisted immediately for 60 seconds to make sure all active communications are blocked. (This time frame can be configured as needed.) After 60 seconds, the IP address is added to our grey list so that valid visitors are not blocked; They can delete the IP address using Cloud Code Browser Integrity Check or CAPTCHA

A Kuwaiti-European company headquartered in  Kuwait City, which specializes in hosting and developing software systems and websites  and is one of the leaders in the list of hosting services  in many  Arab and European countries.