How our DDOS protection works?

What is DDOS?


A distributed denial-of-service (DDoS) attack is an endeavour towards bringing a network resource(server) down so that users can't visit a particular site. DDoS attacks are carried out to target a host and interfere or pause (sometimes stop) its services. Generally, two or more persons, or bots send the DDoS attacks.
On an average, more than 27 attacks are performed every hour in 2014. As the popularity of these attacks is growing day by day, many attackers are coming in and the cost to doing such attacks is quite low. It does not require any super hardwares or softwares so even low-level hackers are often caught in such attacks.

How RockHoster Protects Sites?


RockHoster provides a venture class DDoS protection services against of all known DDoS attacks and makes solid firewall between your site (or server) and whatever remains of the web. Mitigate insidious Layer 7 threats with our Application Firewall Service, providing access to Human Analysis (HBA) is the only technology capable of mitigating Layer 7 HTTP attacks with near 100% accuracy.
All movement to your site (or server) should first pass through our branded DDoS protected proxy before it is sent on. This guarantees that just clean traffic achieves its proposed end of the line.

How our DDOS protection works?

ROCKHOSTER provides protection for all the layers of network

DDOS Protection


Keep your dedicated infrastructures protected against DDoS attacks.

RockHoster offers the most powerful anti-DDoS solution on the market.

It provides your services with round-the-clock protection against all types of DDoS attack, without any limitations in terms of volume or duration.

What is anti-DDoS protection?

As the volume of data that exists on the internet grows exponentially, distributed denial-of-service (DDoS) attacks are becoming increasingly common.





A DDoS attack aims to make a server, service or infrastructure unavailable. An attack can take on different forms. It may saturate the server’s bandwidth to make it unreachable, or it may overwhelm the machine’s system resources, stopping it from responding to legitimate traffic.





During a DDoS attack, requests are sent in high numbers at the same time from multiple points on the internet. The intensity of this”crossfire “ renders the service unstable, and sometimes unavailable.

RockHoster created the anti-DDoS solution precisely to fight against these distributed denial-of-service attacks. With all of our services, we include a migration solution based on a unique technology, which combines three technologies to:

  • analyze data packets quickly in real-time
  • divert your server’s incoming traffic
  • separate non-legitimate requests from others and let legitimate traffic pass through






The progression of a DDoS attack

  1. The server is operational. It sends and receives packets normally.
  2. A DDoS attack starts in different ways — it may overload the bandwidth, or overwhelm the system resources.
  3. The network becomes overloaded, and the server is then unable to process legitimate packets among the mass of incoming data.