Knowledge base
Cloud hosting is a model of web hosting services in which data and applications are stored and processed on remote servers that are accessed via the internet.
P2P is an efficient method of transferring data over the Internet. The best-known example of a P2P network is torrent.
A firewall is a type of system used to monitor connections between computer networks. As one of the first responses to malicious activity carried out over the Internet, firewalls have become a standard part of corporate, government, and private networks.
A proxy server is a system that routes traffic between networks or protocols. The proxy server has its own IP address, so it acts as an intermediary between your computer and the Internet.
Domain Name System blacklists, also known as DNSBL or DNS blacklists, are spam blocking lists that allow the website administrator to block messages from certain systems.
To establish a reliable connection, TCP uses a process called the “three-way handshake”. The established connection will be full-duplex, that is, both channels can transmit information simultaneously, and they also synchronize (SYN) and acknowledge (ACK) with each other.
TLS fingerprintimg helps to effectively detect a wide range of unwanted traffic, while not paying attention to connections with already familiar fingerprints.
Malicious actions impacting web resources on the Internet. Attacks of this kind are usually classified into mass and targeted types. Attacks of the first type target a site as a whole and are usually automated. In mass attacks, attackers use their knowledge of popular tools and widespread vulnerabilities. Targeted attacks, on the other hand, are usually carried out by manually searching for vulnerabilities and exploiting them. The damage inflicted by an attack of this type can be fatal.
UDP flood is a network-based DoS attack carried out by sending large amounts of UDP packets to a remote host’s ports.
Creating a virtual channel for data exchange between two Internet-connected networks by way of encapsulating traffic inside the IP protocol.
A DDoS attack carried out using fragmented packets with an offset, based on exploiting a TCP/IP stack vulnerability.