95th Percentile and Its Value for Protection Against DDoS Attacks

Post category:#StormWall Edu

Although customers of Internet service providers (ISPs) purchase communication channels with a precisely defined bandwidth, they are often not charged for the entire port capacity, but only for the bandwidth actually consumed. For ISP providers, this method is known as burstable billing. Moreover, this actually consumed bandwidth is usually taken into account not according to the highest of the indicators recorded during traffic measurements, but by subtracting 5% of the maximum - according to the largest of 95% of the remaining values. This method is called the 95th percentile.

Read more95th Percentile and Its Value for Protection Against DDoS Attacks

Symmetric and Asymmetric Filtering of DDoS Attacks: What and When to Choose?

Post category:#StormWall Edu

Providers of Anti-DDoS services often offer to connect protection using the asymmetric scheme: only incoming traffic is filtered — the one that goes to the protected resources, and outgoing traffic is not considered at all. In a number of other situations, they use a symmetrical scheme when not only incoming, but also outgoing traffic or service information about it is analyzed.

Read moreSymmetric and Asymmetric Filtering of DDoS Attacks: What and When to Choose?

How to Increase the Stability of Gaming Services Against DDoS Attacks

Post category:#StormWall Edu

It often happens that customers of DDoS protection services believe that just by connecting to these services they are fully protected. Unfortunately, it is not quite right: DDoS protection is not magic or a superpower, and in order for it to work effectively, the services themselves must have sufficient immunity against DDoS risks.

Read moreHow to Increase the Stability of Gaming Services Against DDoS Attacks

Why DDoS Attacks Happen: Reasons and Psychology Behind DDoS

Post category:#StormWall Edu

Although DDoS attacks are mainly carried out with bots, the initiators and coordinators of the attacks are humans. The nature of the attacks, their intensity and duration largely depend on their motivation and behaviors. In this article, we explain why hackers launch DDoS attacks and offer a few recommendations on how to stay safe.

Read moreWhy DDoS Attacks Happen: Reasons and Psychology Behind DDoS

High-Quality Protection Against DDoS Attacks: What’s the Fair Price?

Post category:#StormWall Edu

As you know, quality is very rarely cheap. The protection StormWall offers is no exception: we invest thoughtfully to achieve high quality of our DDoS protection service while keeping fair prices - far from the highest on the market. Thanks to the chosen strategy, we offer a very favorable price-quality ratio.

Read moreHigh-Quality Protection Against DDoS Attacks: What’s the Fair Price?

How to Tell Legitimate Visitors from Bots: Non-Obvious Cases

Post category:#StormWall Edu

It is very important to clearly define what signs can be used to identify legitimate requests so that the anti-DDoS provider can accurately identify the beginning of an attack on the application and defend against illegitimate requests. Application developers and their customers should have an idea of how a DDoS defender thinks and acts, and ensure up front that it can detect and disable bots.

Read moreHow to Tell Legitimate Visitors from Bots: Non-Obvious Cases