./lsh-for-ddos
Stop people from stopping you
Protect your infrastructure without compromise
When attacks happen, your app can't afford downtime. Latitude.sh's enterprise-grade DDoS protection doesn't just detect threats — it eliminates them without impacting your performance.
It's nice to have a partner who's present, reliable, and can work with all over the world.
Introducing unmetered, highly available DDoS mitigation
Routing is not mitigating
Providers that don't have enough capacity will often change routes when you're suffering an attack. Instead of routing, Latitude.sh will mitigate, meaning no increase in latency for you.
No attack is too big
With 7 Tbps of capacity, Latitude.sh's scrubbing centers are equipped to handle any distributed attack, no matter its shape or form.
Included (and extensible)
All Latitude.sh servers offer mitigation of DDoS attacks at no extra cost, so you'll always be protected.
No matter the attack, we can handle it
Network level
- TCP Flood
- UDP Flood
- ICMP Flood
Specially crafted packet
- Stack
- Protocol
- Buffer
Fragmented packet
- Overlapping
- Missing
- Too many
Reflective/amplified
- DNS Flood
- NTP Flood
- SNMP Flood
- SSDP Flood
Application layer
- Repetitive GET
- Slowloris
- SlowRead
./managed-defense-mechanisms
Defend your apps, without lifting a finger
Our DDoS Protection service is fully managed. On top of traditional management features such as IP blocking, ACLs, null routes, blackholes, and unused ports disabling, it goes further with complete protection of layers 3, 4, and 7.
Per-packet protection
Protocol Analysis
- Protocol validation per packet against RFC compliance
Access Control Lists
- Layer 4 ACL GeoIP rules
- RegEx Rules URL ACL
- L7 keyword filtering
Trust Lists
- Static white/black list
- Dynamic trust list
Event Triggered protection
Layer 3/4 Flood Mitigation
- Algorithm- based authentication
- TCP stack connection authentication
- Fragmentation
Layer 7 Flood Mitigation
- Algorithm- based authentication
- HTTPs protection
- Advanced pattern matching
- Watermark
Rate Limiting
- IP behaviour control
- Traffic control by IP port protocol