Blog

January 9, 2023
95th percentile
#StormWall edu

Although customers of Internet service providers (ISPs) purchase communication channels with a precisely defined bandwidth, they are often not charged for the entire port capacity, but only for the bandwidth actually consumed. For ISP providers, this method is known as burstable billing. Moreover, this actually consumed bandwidth is usually taken into account not according to the highest of the indicators recorded during traffic measurements, but by subtracting 5% of the maximum - according to the largest of 95% of the remaining values. This method is called the 95th percentile.

December 1, 2022
Symmetric and asymmetric filtering of DDoS attacks: what and when to choose?
#StormWall edu

Providers of Anti-DDoS services often offer to connect protection using the asymmetric scheme: only incoming traffic is filtered — the one that goes to the protected resources, and outgoing traffic is not considered at all. In a number of other situations, they use a symmetrical scheme when not only incoming, but also outgoing traffic or service information about it is analyzed. When and in which cases should the asymmetric filtering scheme be preferred, and when should the symmetric one be preferred?

November 17, 2022
The mistake cascade increases the drop in resistance to DDoS risks
#StormWall edu


Mistakes in the organization of protection against the risks associated with DDoS attacks almost always lead to a reduction in the resilience of their Internet resources to these risks, and it is impossible to compensate for them solely by connecting anti-DDoS services, even when they are most advanced. The situation is often aggravated by the fact that the combination of several flaws increases their overall negative impact. In this article, we will analyze some of these flaws we encountered while building protection against DDoS risks at a rather large client managing several hundred websites.

November 10, 2022
How to increase the stability of gaming services against DDoS attacks
#StormWall edu

It often happens that customers of DDoS protection services believe that just by connecting to these services they are fully protected. Unfortunately, it is not quite right: DDoS protection is not magic or a superpower, and in order for it to work effectively, the services themselves must have sufficient immunity against DDoS risks.

October 13, 2022
How to increase the sustainability of websites and Internet applications against DDoS attacks
#StormWall edu

increase-resistance-to-ddos-attacks

In this article we will discuss how to achieve security of websites and server components of browsers, mobile applications and services that interact with HTTP/HTTPS-based protocols via APIs.

September 22, 2022
What is needed to protect a network, apart from connecting the anti-DDoS service
#StormWall edu

what-need-to-protect-networkWe provide a brief guide that will help to improve the effectiveness of protecting networks and autonomous systems from DDoS attacks. It lists the aspects that should be taken into account.

August 15, 2022
Attacker’s psychology: what to consider when defending against DDoS attacks
#StormWall edu

Attacker’s psychology: what to consider when defending against DDoS attacksSince an attacker's motivation is not always clear at the beginning of a DDoS attack, we recommend carefully studying and analyzing the course of each attack and evaluating the possible consequences.

July 19, 2022
High-quality protection against DDoS attacks: What's the fair price?
#StormWall edu

High-quality protection against DDoS attacks: What's the fair price?

As you know, quality is very rarely cheap. The protection StormWall offers is no exception: we invest thoughtfully to achieve high quality of our DDoS protection service while keeping fair prices - far from the highest on the market. Thanks to the chosen strategy, we offer a very favorable price-quality ratio.

June 16, 2022
How to tell legitimate visitors from bots: non-obvious cases
#StormWall edu

How to tell legitimate visitors from bots: non-obvious casesIt is very important to clearly define what signs can be used to identify legitimate requests so that the anti-DDoS provider can accurately identify the beginning of an attack on the application and defend against illegitimate requests. Application developers and their customers should have an idea of how a DDoS defender thinks and acts, and ensure up front that it can detect and disable bots.

June 2, 2022
When an attacker knows your infrastructure better than you do, or the most trivial mistakes in connecting DDoS protection
#StormWall edu

When an attacker knows your infrastructure better than you do, or the most trivial mistakes in connecting DDoS protection
Owners of Internet resources, trying to protect them from DDoS attacks, often make mistakes that undo their efforts and investments in protection. Perhaps, most dangerous in this case is that organizations that bought a DDoS protection are under the illusion that they are automatically on the safe side.

May 19, 2022
Why stress tests and other DDoS protection checks are so important
#StormWall edu

Many companies that have protection against DDoS attacks believe that they are now invincible. In fact, that's not entirely true, to say the least. Even if your protection really works after being connected and has successfully repelled several subsequent DDoS attacks, it is by no means a fact that it will also repel attacks that may occur today or tomorrow.

January 11, 2022
Who Launches DDoS Attacks?
#StormWall edu

Who Launches DDoS Attacks?


Who are the DDoS attackers hidden in the virtual network? We can distinguish three main categories of hackers who use the same methods for different purposes.

November 16, 2021
The Danger of DDoS Attacks to Business
#StormWall edu

The Danger of DDoS Attacks to Business

Current trends related to the popularity of IoT, the increase in the number of industries with operations online, and the expansion of 5G create favorable conditions for DDoS attacks.

Shown 1-13 out of 27
We use cookies to make the site faster and more user-friendly. By continuing to use the site you agree to our Privacy Policy
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
© 2013-2024 StormWall.network. All rights reservedPrivacy Policy