Open Telekom Cloud for Business Customers

How to protect yourself from a DDoS attack

by Editorial team

In this article, you will learn more about:

  • Characteristics of and differences between DoS and DDoS attacks
  • DDoS protection and anti-DDoS tools
  • Robustness of cloud platforms to DDoS
  • Anti-DDoS features of the Open Telekom Cloud

Estimated reading time: 2.5 minutes

How to protect against DDoS attacks
DDoS attack can take servers down for hours, during which time web shops and email servers are no longer accessible.

What makes DoS and DDoS attacks so dangerous?

The abbreviation “DoS” stands for “denial of service”, so it is easy to guess what is behind the dreaded DoS attack. The aim of such an attack is to overload a server in such a way that it stops working. The result of this is that web shops are no longer accessible for customers and internal email communication comes to a standstill. The IDG Connect DDoS Survey 2016 establishes that a successful DDoS attack leads to an average downtime of 17 hours, which is an unacceptably long period of time especially for online shops. Such attacks can considerably damage a company’s reputation and cause substantial financial losses. In an DDoS attack, hackers overload the target server by sending faulty IP packets or innumerable requests for individual web pages.

If the attack is coordinated from different computers with different IP addresses, it is called a distributed denial of service (DDoS) attack. DDoS attacks are often launched via botnets, i.e. a network of malware-infected computers whose owners are unaware of the infection.

Such an orchestrated attack is difficult to track, making effective DDoS protection much more difficult to achieve than simple DoS protection. In addition, the increasing prevalence of the Internet of Things makes it easier for cybercriminals to carry out such attacks.

Effective DDoS protection – an insurmountable task for in-house IT departments

Firewalls only offer limited protection against DDoS attacks. If the data volume of the attack is large enough, the company’s in-house IT department is usually powerless to deal with the attack, so there is no way to avoid professional DDoS protection. Anti-DDoS tools from specialized providers such as Telekom’s DDoS Defense provide effective help in preventing DDoS attacks and allow appropriate defensive measures to be taken when all else fails. 

Are cloud platforms particularly vulnerable to such attacks? – Deconstructing the myth

There is a persistent rumor that cloud platforms are particularly susceptible to DDoS attacks. However, such allegations are simply in the realm of myths and legends. In contrast to most companies, public cloud providers have the expertise and resources to successfully fend off DDoS attacks – and the Open Telekom Cloud is no exception.

Anti-DDoS: what makes the Open Telekom Cloud so secure?

The Open Telekom Cloud is a prime example of effective DDoS protection. Comprehensive anti-DDoS tools and packages of anti-DDoS measures minimize the harmful effects of a DDoS attack. What is more, the anti-DDoS service is included in the Open Telekom Cloud – a unique selling point among Infrastructure-as-a-Service providers!

Book now and claim starting credit of EUR 250


Do you have questions?

We answer your questions about testing, booking and use – free of charge and individually. Try it! 
Hotline: 24 hours a day, 7 days a week
0800 3304477 from Germany / 00800 33044770 from abroad

  • Communities

    The Open Telekom Cloud Community

    This is where users, developers and product owners meet to help each other, share knowledge and discuss.

    Discover now

  • Telefon

    Free expert hotline

    Our certified cloud experts provide you with personal service free of charge.

     0800 3304477 (from Germany)

    +800 33044770 (from abroad)

    24 hours a day, seven days a week

  • E-Mail

    Our customer service is available free of charge via E-Mail

    Write an E-Mail