VOLUMETRIC DDOS PROTECTION

Basic Protection Against High-Volume Network Layer Attacks
The Volumetric DDoS protection model targets high-volume attacks occurring at the L3/L4 layer.
This model is particularly effective against attacks designed to exhaust bandwidth.
This service model:
  • Provides protection againstGbps/Tbps scale attacks
  • Cleans attack traffic using a scrubbing center architecture
  • Uses BGP diversion mechanisms for traffic redirection
  • icon

    Protected attack types

    • UDP Flood
    • TCP SYN Flood
    • Amplification attacks (DNS, NTP, CLDAP, etc.)
  • icon

    Key features

    • L3/L4 network layer protection
    • Mitigation based on PPS or traffic thresholds
    • RTBH (Remote Triggered Black Hole) support
    • Traffic filtering via BGP Flowspec
    • Rapid intervention at the edge router level
    • This model provides basic volumetric attack protection, but does not cover application layer attacks.
  • icon

    Service approach

    • SLA: Best Effort
    • Traffic flows through normal routing
    • Mitigation activates when an attack is detected
    • RTBH can be applied if necessary
    • Volumetric protection is positioned as a baseline security layer for internet-facing services.

INLINE ADVANCED DDOS PROTECTION

Advanced DDoS Protection Including the Application Layer
The Inline Advanced DDoS protection model is based on an always-on protection architecture, where traffic continuously passes through security devices.
This model:
  • Performs attack analysis at L3, L4, and L7 layers
  • Continuously monitors traffic and detects anomalies
  • Filters attacks at the application level
  • icon

    Protected attack types

    • HTTP GET / POST Flood
    • Slowloris attacks
    • HTTPS CPU Exhaustion
    • Bot-based application layer attacks
  • icon

    Key features

    • Always-on protection architecture
    • Application-aware filtering
    • Optional SSL inspection
    • Bot mitigation and behavioral analysis
    • Real-time attack detection
    The inline model is particularly designed for critical applications such as:
    • E-commerce platforms
    • Financial services
    • SaaS applications
    • High-traffic web services
  • icon

    Service approach

    • SLA: Guaranteed Mitigation
    • Traffic is continuously analyzed inline
    • SOC-supported operational response is available