Game/Web Server Anti-DDoS Protection

HomepageGame/Web Server Anti-DDoS Protection

About our Game and Web Server DDoS Protection

We protect our network very effectively against DDoS attacks by using our own detection software + filters as well as Voxility. The protection automatically detects and filters "bad traffic" and protects IP addresses against DDoS attacks up to 20TBps .

If you want to protect a website (HTTP or HTTPS) against DDoS attacks, we additionally recommend the use of Layer 7 Protection for higher efficiency. A DDoS attack can be detected and filtered much faster with Layer 7 Protection. When using SSL, it makes sense to store the certificate in the firewall software.

During an attack, the server remains accessible and you can use the services normally. Non-relevant ports are blocked as long as the attack persists, e.g. icmp for ping.



Arbor Routed is designed to stop DDoS attacks in the cloud, before they reach your applications, data centers, and infrastructure. Network traffic is redirected through Arbor scrubbing centers by making a simple border gateway protocol (BGP) route advertisement change. Arbor offers two deployment options ― always-on is ready to mitigate malicious traffic at all times, and on-demand allows you to redirect traffic when you’re under attack.

Arbor Routed is built on a DDoS mitigation platform with 18 global scrubbing centers, closer to users and attackers to minimize performance latency and improve network resiliency. Traffic is routed through the closest available scrubbing center, and proactive mitigation controls are architected to drop attacks instantly. Arbor SOC experts analyze the remaining DDoS traffic to quickly and efficiently apply the most appropriate mitigation for every attack vector. Clean traffic is then forwarded to your applications and data centers, and outbound traffic returned directly to users.

List of games and applications::

Arma III, Half-Life, Team Fortress Classic, Counter-Strike 1.6, Counter-Strike : Source, Half-Life Deathmatch Classic, Half-Life 2, Half-Life 2 : Deathmatch, Day of Defeat, Day of Defeat : Source, Left 4 Dead, Left 4 Dead 2, Team Fortress 2, Counter-Strike : Global Offensive, Garry's Mod, Grand Theft Auto San Andreas Multiplayer SA : MP, Multi Theft Auto San Andreas MTA : SA, Grand Theft Auto 5 RAGE-MP, Minecraft Pocket Edition, Minecraft, ARK : Survival Evolved, RUST, TeamSpeak, Mumble.


Everything under control

All important standard ports remain accessible during a DDoS attack and are filtered by the protection.

Arbor Arbor protects the main attacks. For further protection measures we will use our own dedicated firewall, passing it is associated with extra cost. We offer comprehensive anti DDoS protection in 2 compartment protection they are safer.

1 Protection is provided by Arbor everything was running through Arbor is filtered through our own firewall

Information about Layer 7 DDoS Protection

There are different types of DDoS (Distributed Denial of Service) attacks. Basically, a DDoS is a "denial of service" that is deliberately caused by a large number of requests and thus leads to an overload of the data network or the server.

DDoS attacks can target different layers (see ISO/OSI layer model). Compared to earlier versions, current DDoS attacks often target the top layer (Layer 7). Layer 7 is the application layer and serves to provide functions for the applications and is responsible for data input and output.

Layer 7 attacks specifically target Layer 7 protocols such as Telnet, FTP, NNTP, HTTP or SMTP. Compared to other DDoS attacks, Layer 7 attacks require far less bandwidth and packets to disrupt services. A low-level protocol attack such as SYN flood requires a huge number of packets to perform an effective DDoS attack, while a Layer 7 attack requires only a limited number of packets to perform a large DDoS attack.

The most common Layer-7 attack is HTTP flooding. Here, an HTTP request is sent to the affected server and uses considerable resources, and although the number of packets is limited, they fully utilize all server resources and lead to a denial of service.

Layer 7 protection is activated by us at your request, and we also deposit the certificate in the firewall software.


Top