{"id":36283,"date":"2022-06-30T09:26:20","date_gmt":"2022-06-30T01:26:20","guid":{"rendered":"https:\/\/www.casbay.com\/blog\/?p=36283"},"modified":"2022-09-22T17:15:00","modified_gmt":"2022-09-22T09:15:00","slug":"is-your-vps-server-prepared-for-ddos-attacks","status":"publish","type":"post","link":"https:\/\/www.casbay.com\/blog\/vps-hosting\/is-your-vps-server-prepared-for-ddos-attacks","title":{"rendered":"Is your VPS server prepared for DDoS attacks?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"36283\" class=\"elementor elementor-36283\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e88d00 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e88d00\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-177a8b7\" data-id=\"177a8b7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed79289 elementor-widget elementor-widget-image\" data-id=\"ed79289\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2022\/06\/Is-your-VPS-server-prepared-for-DDoS-attacks-1024x576.webp\" class=\"attachment-large size-large wp-image-36284\" alt=\"cloud vps ddos protection\" srcset=\"https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2022\/06\/Is-your-VPS-server-prepared-for-DDoS-attacks-1024x576.webp 1024w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2022\/06\/Is-your-VPS-server-prepared-for-DDoS-attacks-300x169.webp 300w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2022\/06\/Is-your-VPS-server-prepared-for-DDoS-attacks-768x432.webp 768w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2022\/06\/Is-your-VPS-server-prepared-for-DDoS-attacks-1536x864.webp 1536w, https:\/\/www.casbay.com\/blog\/wp-content\/uploads\/2022\/06\/Is-your-VPS-server-prepared-for-DDoS-attacks.webp 1600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-77d188b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77d188b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bd9ca74\" data-id=\"bd9ca74\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cb9aca3 elementor-widget elementor-widget-text-editor\" data-id=\"cb9aca3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2>What is a DDoS attack?<\/h2><p>With the growth of the internet, the number of DDoS attacks also increases. During a DDoS attack, a massive number of devices (thus\u00a0<em>distributed<\/em>) bombard an organization&#8217;s (or a person&#8217;s) server with copious amounts of traffic. The motives for a DDoS attack\u00a0vary greatly; from dissatisfaction to\u00a0a bad joke\u00a0or even blackmail.<\/p><p>\u00a0<\/p><p>The intensity of the attack makes the website or internet service inaccessible. People can&#8217;t make deposits (or access their accounts) at banks, can&#8217;t make appointments at clinics, and can&#8217;t make payments at webshops.<\/p><p>The aim of the attack is to render the server, service or infrastructure inaccessible. This can be done in various ways. The attack can saturate the server&#8217;s bandwidth to make it inaccessible or it can overload the machine&#8217;s system resources. As a result, it no longer responds to \u2018normal\u2019 traffic.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf65af3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf65af3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3193c72\" data-id=\"3193c72\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a994c8a elementor-widget elementor-widget-text-editor\" data-id=\"a994c8a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2>What can you do against a DDoS attack?<\/h2><p>Strong planning, as it is most of the time, does half the job. When a DDoS attack occurs, it is likely that you are too late. So, have a plan and take a close look at the current situation. Examine the web server&#8217;s capabilities and when needed, change the load balancing.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4d3822d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4d3822d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-43e998d\" data-id=\"43e998d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e268518 elementor-widget elementor-widget-text-editor\" data-id=\"e268518\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>5 examples of ways to prepare your server against a DDoS attack<\/h3><ul><li>Make sure your infrastructure is capable of handling massive volumes of traffic.<\/li><li>When possible, use redundant infrastructure that scales automatically (horizontal scaling) or balances the traffic<\/li><li>Setup DDoS protection for each website\/host by using external services such as CloudFlare (beware of additional costs)<\/li><li>Implement a third-party mitigation service in front of your infrastructure<\/li><li>Use webserver software with inherent protection like NGINX using request limiting<\/li><\/ul><p>\u00a0<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b29337e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b29337e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-57648fd\" data-id=\"57648fd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7469d5 elementor-widget elementor-widget-text-editor\" data-id=\"f7469d5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>What does DDoS protection from Tilaa entail?<\/h3><p>Tilaa protects your cloud infrastructure against DDoS attacks in various ways. In short, we guarantee:<\/p><ul><li>A strong and powerful network<\/li><li>DDoS mitigation<\/li><\/ul>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-689444c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"689444c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bae01a9\" data-id=\"bae01a9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eeba3d9 elementor-widget elementor-widget-text-editor\" data-id=\"eeba3d9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3>Full redundancy and a strong network<\/h3><p>If you have several servers and the attack is aimed at just one server, you\u00a0<em>could<\/em>\u00a0be safe. However, this requires a lot of coincidence. Therefore, it\u2019s more important to choose a strong network.<\/p><p>The \u00a0<a href=\"https:\/\/www.casbay.com\/cloud-hosting\">Casbay<\/a>, is fully redundant with top quality equipment that is internally connected. The routes are interconnected and operate along geographically distinct routes. Our network is not likely to be the bottleneck in a DDoS attack.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is a DDoS attack? With the growth of the internet, the number of DDoS attacks also increases. During a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":"","_wpscppro_custom_social_share_image":0},"categories":[94],"tags":[102],"_links":{"self":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts\/36283"}],"collection":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/comments?post=36283"}],"version-history":[{"count":4,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts\/36283\/revisions"}],"predecessor-version":[{"id":36307,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/posts\/36283\/revisions\/36307"}],"wp:attachment":[{"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/media?parent=36283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/categories?post=36283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.casbay.com\/blog\/wp-json\/wp\/v2\/tags?post=36283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}