What Is Infrastructure Security
Infrastructure security deals with the protection of internal and extranet networks, labs, data centers, servers, desktops, and mobile devices
inoiTECH provides an agile and efficient, network-wide protection against the full spectrum of Cyber security attacks, including the challenging multi-vector attacks, which use a combination of high rate volumetric or network protocol attacks, and more sophisticated application attacks.

Cyberattacks can target either your IP’s or Domains trying to find the weakest link in your defense system, attempting to bring down your service or to create a data breach.

The impact of such an attack can be way more than the expense of mitigation or the loss of sales revenue from a compromised web property. These attacks can severely impact trust and brand loyalty with long term implications.
Types of DDoS attacks
DDoS attacks can be carried out in different ways (attack vectors), but an attack vector will be one of the following three categories:

Within these categories, the actual attack vectors being used are evolving continuously. There is an acceleration of innovation with new and more complex attacks and tools. Targeting either your domain or IP address. Below we will explain in more detail about the different attack vectors:
Attackers attempt to consume the bandwidth either within the target network/service, or between the target network/service and the rest of the Internet. These attacks are about causing congestion by flooding a network interface with attack traffic in order to overwhelm its resources and deny it the ability to respond to legitimate traffic.
Attacks are measured in bits per second (bps), and common attacks include UDP and ICMP floods.
Volumetric (Layer 3) attacks
Attackers attempt to drain resources by sending open requests, with (spoofed) IP addresses, saturating the connection state tables of the victim to a point when they cannot respond to legitimate requests. Even high capacity devices capable of maintaining state on millions of connections can be taken down by these attacks.
Common attacks include Anomalous TCP flag combinations (no flag, SYN/FIN, SYN frag, LAND attack), Ping of Death and POODLE attack, and are all measured in packets per second (pps).
Protocol based (Layer 4) attacks
Attackers attempt to bring down a service by sending seemingly harmless requests commonly using HTTP or DNS. These attacks are slow and stealthy but can be very effective in bringing down your service with as few as one attacking machine generating a low traffic rate.
Common attacks include Slowloris, Apache killer and HTTP floods. Attacks are measured in requests per second
Application (Layer 7) attacks
We use cookies to provide the best site experience.