Denial of hosting service due to ddos attacks.

Started by safracatz, Jul 15, 2022, 10:35 AM

Previous topic - Next topic

safracatzTopic starter

For one year we kept a small gaming site for children. About a hundred visitors a day. On hosting **********.com at the cheapest rate.

There were troubles with the site freezing, but techno solved them.
As soon as we paid for the second year, on the same day the site was blocked by the hoster. The support explained that they did it automatically because of a ddos  attack on our site.
After our request, the site was turned on, but it was cut down in half a day. Again, allegedly because of the attacks.

For a week now, they have been reacting to requests to turn it on with "breakfasts" without doing anything and offer the following options:
1) go from us. When asked about a refund, they react indistinctly that we ourselves are to blame for ddos  attacks, since we did not have protection against them.
2) pay monthly at the most expensive rate as for a dedicated server. And plus put third-party protection against attacks.

Tell me how and what to do?


Protection against DDoS attacks is not the job of a hosting provider. This is exactly the same service as hosting or server rental. just a good proposal differs from a bad one in that it is thought out to the smallest detail.
the fact that they send you to hell and tell you to look for DDoS protection on the side, only shows that they are ready to abandon their client.

I think the fact that they did not initially warn you about DDoS attacks, and now they are trying to sell something at the price of a dedicated server, does not characterize them very positively and you will want to completely move to a hosting company that will be a pleasure to deal with.


What is the difference between DoS and DDoS?
In the arsenal of cybercriminals there is another type of Denial of Service attack — a DoS attack. Its main difference from a DDoS attack is that only one device is used to send requests to the web site, not a network.

What is the threat of a DDoS attack.
Attackers use DDoS attacks for several reasons:
To stop the work of some service, for instance, to disrupt online classes or exams.
For extortion. "hаckers send out letters to organizations around the world demanding a ransom in bitcoins , and threaten a powerful and prolonged DDoS attack in case of non-payment,".
As a tool to fight competitors. Most often they are ordered by owners of illegal businesses, since their competitors will not go to the police, as well as small niche legal businesses that want to slightly improve their position in the market;
To distract attention, to introduce encryption viruses and/or steal corporate information against the background of the attack.
The attackers' goal is to disable an online resource and make it inaccessible to the end user.

These actions pose two threats to the commercial sector:

loss of profit;
reputational costs.
State-owned companies cannot fulfill their obligations to users, for instance, to provide public services. "A DDoS attack on a bank can lead to lost profits for the company itself, as well as for users. In addition, it is a loss of reputation among consumers,".

How to protect yourself from DDoS attacks

The main method of protection is filtering traffic based on its content, IP addresses and other parameters. There are two ways to implement it:
Install your own server and software. That approach allows you not to depend on third parties and to fully control your infrastructure, adjusting everything to your own needs. "The installed equipment allows you to analyze all network calls to the service and filter out suspicious requests," explains Tsypko.

Purchase DDoS protection in the form of a service from a third-party company. That way makes it possible to reduce the costs of servicing your equipment, removes the need to hire specialized security specialists within the company. External anti-DDoS services can be enabled or disabled at any time. That method of protection has gained the greatest popularity over the past 5 years. Such services are offered, for instance, by most providers (web hosting, Internet) or specialized organizations.
Attacks can occur due to vulnerabilities in the system components of the organization, so it is necessary to regularly monitor the system update.

Companies also need to make sure that corporate sites and IT resources are able to handle a large amount of traffic.