+31 (0) 88 668 62 53


A distributed denial-of-service (DDoS) attack endangers the availability of your IT infrastructure. Such an attack is a malicious attempt to disrupt the normal traffic of a server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of internet traffic. In the case of an attack, the attacker uses multiple compromised sources across the internet to generate this.

DDoS attacks can be segregated by the seven layers of the Open Systems Interconnection (OSI) model they attack. Each layer of the OSI model handles a specific job and communicates with the layers above and below. DDoS attacks are most common at the Network (Layer 3), Transport (Layer 4), Presentation (Layer 6), and Application (Layer 7) layers.

Our free of charge DDoS protection is included with every dedicated 'bare metal' server. It is the first line of defense against Layer 3 and 4 attacks.

Attacks at Layer 3 and 4, are typically categorized as Infrastructure layer attacks. These are the most common type of DDoS attacks and include vectors like synchronized (SYN) floods and other reflection attacks like User Datagram Packet (UDP) floods. These types of attacks are usually large in volume with the purpose of overloading the capacity of the network or the application servers. Fortunately, these are also the type of attacks that have clear signatures and are easier to detect.

How does NovoServe protect against Layer 3 and 4 attacks?

Monitored 24/7 by our Network Operations Center, our DDoS protection ensures that your traffic is automatically scrutinized against the latest DDoS attack policies and patterns. Our real-time monitoring capabilities detect and effectively eliminate the attack. Your service will not be disrupted.

Having a large network with extensive capacity allows us to analyze and respond to attacks quickly and efficiently, often stopping them before they ever occur. We take real-time samples of the network traffic at the edge of the network. When an incoming threat is detected, flow-spec and filtering rules are applied to filter the anomaly and mitigate the threat. As this takes place at our network edge, there are no further bandwidth constraints inside our network.

Do You Need More Information? Need Assistance?

Contact one of our sales representatives to discuss your unique hosting requirements and fire off all the questions you may have.