What is DDoS?

 

 

DDoS, short for Distributed Denial of Service, is a type of DOS attack where multiple compromised systems — which are usually infected with a Trojan — are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.

In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.

 

 

When a DDoS attack occurs, it overloads the targeted system with too much traffic, causing it to go down. This can cause you downtime and be costly for your business.

 

At GigeNET we specialize in DDoS Protection and filtering out attack traffic, while still allowing the clean traffic from your customers and users through to your system(s). Learn more about the types of DDoS attacks and how they work.

 

Place your website behind our ProxyShield® mitigation system, and effectively put a stop to Distributed Denial of Service (DDoS) attacks which may otherwise cause extended periods of downtime for you and your customers.

Under Attack?

Have a DDoS Specialist contact me immediately!

Or call: 1-800-561-2656 for immediate assistance.

captcha

Testimonials

freecodesource.com

" We received a large DDoS attack causing it to go offline. Our hosting provider at the time was unable to stop the attacks for 2 days. GigeNET got our site up within hours of contacting them and we STAYED UP! We now host ALL of our services exclusively with GigeNET! "

freecodesource.com

templatemonster.com

" During our growth period we were under malicious attacks. GigeNET helped us grow and take our business to the next level. We now host with GigeNET and continue to rely on them for DDoS attacks when and if they occur. "

templatemonster.com