A Distributed Denial-of-Services attack can pretty much be related to a traffic jam. Just like vehicles are slowed down or even get stalled by a traffic jam, numerous malicious IP packets flood the network and prevent legitimate requests from reaching your server. DDoS attacks are relatively cheap to launch these days, though they often require significant resources to mitigate against.
Out team has been successfully mitigating against DDoS attacks for years. Based on our vast experience we've developed a solution combining both hardware and proprietary software components that will protect your web property against DDoS attacks of all types with SLA guarantee.
Typically a Distributed Denial-of-Service (DDoS) attack involves numerous compromised devices across the globe which are often referred to as a Botnet, whereas a Denial-of-Service (DoS) attack can be launched from a single device connected to the Internet. Most web based attacks, whether it is a DoS or a DDoS attack, can be divided into three major categories: volume based attacks, attacks targeting core web protocols and application layer attacks. Some of these attacks can bring down a server, whereas others are capable of knocking out the whole network segment.Read More
Volume based atacks are the most common types of web based threats making up of almost 65% of all registered ones. The goal of these attacks is to consume bandwidth capacity of the target server or network and render it unreachable to legitimate requests. UDP/ICMP and other spoofed-packet floods fall under this catefory. The scale of volumetric attacks is measured in bits per second (Bps), or more typically in Gigabits per second (Gbps).
The target of protocol based attacks is to consume hardware resources of application servers and network equipment including firewall and load balancers rather than saturating bandwidth. Most common examples of this type of DDoS attacks are fragmented packet attacks, SYN floods, Smurf DDoS and Ping of Death. DDoS attacks targeting hardware resources are measured in packets per second (Pps) or more typically Mpps which stands for million packets per second.
The trickiest type of DDoS attacks targets web servers and operating system vulnerabilities. These attacks can be extremely effective yet very difficult to detect and mitigate against, as they tend to mimic legitimate and virtually harmless requests. GET/POST floods, attacks that target web servers such as Apache and Nginx or critical Windows and Linux OS flaws fall under this category. The scale of Application Layer Attacks is often measured in Requests per second (Rps).
Successful mitigation of a DDoS attack is 100% SLA guaranteed within the limitations implied by the chosen protection package specifications. In an unlikely scenario of failure to mitigate against an attack that does not exceed the ordered protection package limits, we will return the whole amount paid for the protection package and its setup.
DDoS attacks continue to increase in size and frequency on a monthly basis. Keeping up with this alarming trend requires regular investments in hardware and uplink bandwidth capacity. Current bandwidth capacity of our network exceeds 400 Gbps which is more than enough for successful mitigation of virtually every attack that can target our customers.
Hackers behind the DDoS attacks who are seriously determined to bring the target server down often shift tactics, especially if the initial attack strategy was of no success. That's why it is so important to constantly monitor the attack patterns, both automatically and under engineers' supervision, and adjust mitigation techniques accordingly.
No matter whether you have a hosting package with our company or rent a server from any other provider, we have a solution for you. Our engineers will filter out all the malicious traffic and direct legitimate request to your backend server hosted anywhere in the world through an encrypted tunnel which is often referred to as a Remote DDoS Protected Proxy.
If your server setup requires any specific networking, security or access patterns, configure your personal firewall presets and rules to be executed on a hardware firewall without adding any extra CPU load to your backend server. Hardware firewall can be especially useful when your server experiences a high traffic load.
We constantly monitor incoming traffic for signs of malicious activity and start filtering it out when the first few packets with attack signature are detected. Basically, reaction time is so fast that in most scenarios neither you nor your users will be able to notice that a DDoS attack has been launched against your website or server.
To ensure best user experience while providing strong DDoS protection, our engineers implement various measures to achieve the lowest false positive rate possible. This includes studying each customer's legitimate traffic patterns and developing custom filter rules that tailor to their requirements and eliminate false positives.
Strategic location right in the heart of Europe, long lasting stability, neutrality and political independence make Switzerland the perfect country to host your mission critical infrastructure. Switzerland is well known for its strict laws on privacy and data security. There's hardly any other country in the world with a matching grade of data protection at the state level.
We've been fighting with web-based threats and successfully mitigating against DDoS attacks since the very moment of our company's foundation. Experience gained by our engineers over the course of 5 years allowed us to develop a proprietary attack mitigation solution and provide DDoS protection with an SLA guaranteed result.
Swiss Made is a customer oriented company. We strive to hold a very high customer satisfaction rate and provide live around-the-clock sales and technical support. Should you have any questions, please text us through the live chat widget to get an immediate assistance or open a new support ticket inside your account area.
At SwissMade.host, we are proud to be a Zurich-based web hosting company that shares the most distinct features that Switzerland is renowned for. We guarantee that your orders and requests will be processed in accordance with our company's strict privacy, data protection, customer orientation and quality assurance policies.
Select a billing cycle that you wish to proceed with and DDoS protection prices will be updated accordingly. The longer the cycle you select, the higher your personal discount will be.
DDoS protection package for a single website that supports basic protocols only. It is recommended to select this package if only you are certain about the type and magnitude of attack that targets your website.
Advanced protection package for multiple websites and domains with extra features and extended support of protocols including HTTPS, SMTP and protected DNS hosting. As a rule of thumb, select this package when unsure what type or magnitude of a DDoS attack your web property is being hit with.
Enterprise-grade protection against all types of DDoS attacks for up to five websites and ten domains. This package includes industry leading mitigation technology, hours of our skilled engineers' work to fine-tune the filters and a ton of features to keep your web property secure yet accessible for all the legitimate requests.
If you already are a client of our company, there's not much needed to do on your side in case of a DDoS attack. Most likely you won't even notice that your website or server is under an attack, courtesy of the basic DDoS protection feature that is provided with most of our hosting products. However, if an attack is massive enough and scales beyond the free-of-charge mitigation limit that is included with your VPS, Cloud or Dedicated Server plan, you may want to consider ordering a DDoS protection add-on to cope with it.
Upgrading to a higher level of DDoS protection won't take much time, however, it is a good idea to order a more comprehensive DDoS protection plan beforehand, if you operate a web-based business that is known to attract frequent DDos attacks, e.g. a game server. Get a quote on the mitigation capacity add-on for your hosting plan from our help desk through the live chat widget or open a new ticket inside your account area.
Obviously, it's an advantage to have your data and applications hosted within our protected network in case of a DDoS attack, but it's not the only option. If you rent a server from any other web hosting provider and want to get protected against DDoS attacks, we have a solution for you.
This technique is often called a Remote DDoS Protected Proxy and is basically an encrypted tunnel between our secure facility in Zürich and your backend server. In case of a DDoS attack all requests that target your server will be routed through the mitigating hardware located at our data center in Zürich to filter out malicious packets and make sure that all legitimate requests reach the backend server. Your backend server's real IP address will be obscured behind our secure proxy to make it unreachable for the attackers.
Some Layer 4 attacks cannot be successfully mitigated through a remote DDoS protected proxy by design. Please consider moving your website(s) or service(s) to our protected network for maximum security.
We accept a variety of most common and convenient payment methods available to this day: VISA, MasterCard, American Express, Discover, PayPal and Bank Wire transfers. In addition to the conventional and widely used payment processors you can also place an order with crypto and digital currencies: Bitcoin, Bitcoin Cash, Ethereum, Dash, Litecoin, Nextcoin, Tether, Perfect Money, QIWI, WebMoney and over 50 Altcoins via CoinGate. However, please be advised that sending crypto payments directly (without any proxy payment service involved) is recommended privacy-wise.Payment methods