Defense in Depth

Every request passes through three layers of rigorous filtering before it ever touches your infrastructure.

OVH Network

eBPF/XDP

L7 Proxy

Your Server

Volumetric
TCP Flood
L7 Attack
Clean Traffic

Mitigated Attack Vectors

Our infrastructure is built to automatically detect and mitigate the widest range of DDoS attacks, ensuring your services remain available.

L4 - Transport Layer

Protection against volumetric and protocol-based attacks targeting the network infrastructure.

TCP SYN Flood
UDP Flood
TCP ACK Flood
TCP RST Flood
ICMP Flood
IP Fragmentation
GRE Flood
Amplification Attacks (DNS, NTP, SNMP, Memcached, LDAP, SSDP, CHARGEN, QOTD)

L7 - Application Layer

Advanced filtering for sophisticated attacks mimicking legitimate user behavior.

Invalid HTTP Requests
TLS method
HTTP Flood
Slowloris
Slow Post / Slow Read
DNS Query Flood
Zero-Day Web Attacks
Credential Stuffing
Botnet Traffic
Malicious User Agents