DDoS Protection
DETECTION. FILTERING. MONITORING.
We use Interior Border Gateway Protocol (iBGP) to intercept traffic
and Generic Routing Encapsulation (GRE) tunneling to
deliver clean traffic back to hosted solutions.

Reliable Servers DDoS Protection: How it works

Reliable Servers Hosting DDoS Protection works by dynamically routing traffic to your server when an attack is detected. ‘Bad’ traffic is filtered while clean traffic is able to reach your servers. We use Interior Border Gateway Protocol (iBGP) to intercept traffic and Generic Routing Encapsulation (GRE) tunneling to deliver clean traffic back to hosted solutions.
Detection
Traffic on our network is automatically monitored for anomalies 24/7/365 using sFlow sampling collectors in our Attack Detection System (ADS). This monitoring method allows us to passively monitor traffic while maintaining optimal routing for your solution under normal (attack-free/quiet) periods. Attack detection is fully automated based on proprietary detection algorithms, which our in-house engineers update, fine-tune and improve to deliver cutting edge DDoS protection. The typical time for ADS to qualify an attack is under a minute, and traffic is fully re-routed within seconds of qualification.
Filtering
When a DDoS Attack is detected, incoming traffic is re-routed to our Attack Mitigation Farm (AMF). The incoming capacity into the AMF is significant and growing. The AMF is automatically and instantly programmed with rules that are learned from the ADS based on specific attributes of the then-current attack. Clean traffic utilizes GRE tunneling to the switches where your servers are physically connected. This is the same technology as other, publicly-traded DDoS Mitigation providers use, however our technology exists wholly inside our datacenters so no packets ever leave our premium low-latency network as one might typically encounter with a 3rd party DDoS Mitigation service provider.
Monitoring
Our Engineers have extensive monitoring tools. The Customer interface located at https://my.reliableservers.com includes a dashboard to assist you with visualizing attacks and mitigation efforts..

Frequently Asked Questions


Does this block both TCP and UDP Traffic?

Yes.

We bought the 1 GBPS plan and our attack size is 2 GBPS? What happens if we suffer an attack larger than the Protection we have purchased?

If the incoming bandwidth dramatically exceeds your purchased plan, we will notify you to suggest an upgrade. If you choose not to upgrade, the DDoS Mitigation service will automatically de-activate during future attacks upon reaching the bandwidth threshold.

Are you using any 3rd Party hardware for DDoS Protection?

No. All systems for Monitoring and Mitigation have been created by our engineering team.

Do you offer a Control Panel where we can see details regarding attacks on our server?

While this feature is under development, basic reports may be available upon request. Please do so as quickly as possible as log retention is brief.

Will the support team available 24/7 while there is any major attack with DDoS?

Our support team is always available 24/7.

Does your company provide multiple DDoS plans on single server?

Yes. Please discuss options and pricing with any account executive.
Get in touch with us Contact Our Team
Home Dedicated Servers DDoS Protection Datacenters & Network Reliability Guaranteed Customer Login Contact Company
© 2017 Reliable Servers™ All Rights Reserved CAN-SPAM Policy Acceptable Use Policy Terms of Service Privacy Policy SLA Affiliate