{"id":2472,"date":"2016-08-01T15:48:35","date_gmt":"2016-08-01T13:48:35","guid":{"rendered":"http:\/\/proudwing.com\/da\/?page_id=2472"},"modified":"2019-03-20T15:24:48","modified_gmt":"2019-03-20T14:24:48","slug":"ddos","status":"publish","type":"page","link":"https:\/\/chosting.dk\/da\/ddos\/","title":{"rendered":"DDoS Beskyttelse"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1432903103865{background-color: #45444b !important;}&#8221; el_class=&#8221;DDos_first_section&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;Shift_right&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1431&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;ready_for_action DDos_Atack&#8221;]<\/p>\n<h3>Hvad er et DDoS-angreb?<\/h3>\n<p>Antallet af DDoS- og DoS angreb er eksploderet p\u00e5 det seneste.<br \/>\nN\u00e5r et angreb er st\u00f8rre end virksomhedens kapacitet, betyder det at reelle foresp\u00f8rgsler ikke l\u00e6ngere kan besvares, grundet overbelastning af linjen og systemerne.<\/p>\n<p>De kriminelles form\u00e5l med et DDoS angreb er at overbelaste virksomheden i s\u00e5dan en grad, at det ikke l\u00e6ngere er muligt, at afvikle nogen form for services \u2013 heraf navnet Denial Of Services.<\/p>\n<p>DDoS angreb kan k\u00f8bes til n\u00e6sten ingen penge i dag, seneste analyser viser at alle har i mere eller mindre grad oplevet et DDoS angreb. Hvis kritiske systemer s\u00e6ttes ud af drift, kan det have store \u00f8konomiske konsekvenser.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;Genuine_DDoS&#8221; css=&#8221;.vc_custom_1432905107061{background-color: #f8f8f8 !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;mobile_image_center&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1433&#8243; img_size=&#8221;full&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;ready_for_action&#8221;]<\/p>\n<h3>Professionel DDoS beskyttelse<\/h3>\n<p>Det kan v\u00e6re sv\u00e6rt at vide om man er under et DDoS angreb, eller om der blot er tale om meget stor trafikforesp\u00f8rgsel. Ved DDoS beskyttelse fra cHosting, reagerer vi \u00f8jeblikkeligt p\u00e5 eventuelle unormale foresp\u00f8rgsler, vores dedikerede anti-ddos bokse kan med det samme spotte et unormalt m\u00f8nster og p\u00e5begynde mitigering af trafikken, f\u00f8r den rammes jeres server.<\/p>\n<p>cHosting benytter sig af teknologi og udstyr fra Arbor Networks som er verdens f\u00f8rende inden for DDoS beskyttelse. Al trafik renses p\u00e5 backbone niveau og via avancerede anti-ddos udstyr (hardware).[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;DDos_third_section&#8221; css=&#8221;.vc_custom_1460099457619{margin-bottom: 35px !important;background-color: #2d3342 !important;}&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;manage&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1432905456717{background-color: #242a36 !important;}&#8221;][vc_raw_html]JTNDaDQlM0UyNCUyRjclMkYzNjUlM0MlMkZoNCUzRSUwQSUzQ3AlM0VWb3JlcyUyMGRkb3MlMjBiZXNreXR0ZWxzZSUyMGVyJTIwJUMzJUI4amVibGlra2VsaWcuJTIwRGV0JTIwYmV0eWRlciUyQyUyMGF0JTIwdmklMjBpa2tlJTIwYWZ2ZW50ZXIlMkMlMjBtZW4lMjByZW5zZXIlMjB0cmFmaWtrZW4lMjBvbWclQzMlQTVlbmRlJTJDJTIwZiVDMyVCOHIlMjBkZW4lMjBuJUMzJUE1ciUyMGplcmVzJTIwc2VydmVyLiUyMEREb1MlMjBiZXNreXR0ZWxzZW4lMjBlciUyMGFrdGl2JTIwMjQlMkY3JTJGMzY1JTIwcCVDMyVBNSUyMGFsbGUlMjBzZXJ2aWNlcy4lM0MlMkZwJTNFJTBB[\/vc_raw_html][\/vc_column_inner][vc_column_inner el_class=&#8221;unmanage&#8221; width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1432905432220{background-color: #242a36 !important;}&#8221;][vc_raw_html]JTNDaDQlM0VVbmRlciUyMGFuZ3JlYiUzRiUzQyUyRmg0JTNFJTBBJTNDcCUzRUtvbnRha3QlMjBvcyUyMG1lZCUyMGRldCUyMHNhbW1lJTIwZm9yJTIwYXQlMjBzZSUyMHAlQzMlQTUlMjBtdWxpZ2hlZGVybmUlMkMlMjBodmlzJTIwSSUyMGVyJTIwdW5kZXIlMjBldCUyMGFuZ3JlYi4lMEFTZW5kJTIwb3MlMjBlbiUyMG1haWwlMjBlbGxlciUyMGtvbnRha3QlMjBvcyUyMHZpYSUyMHZvcmVzJTIwa29udGFrdGZvcm11bGFyJTIwLSUyMHZpJTIwdmVuZGVyJTIwaHVydGlndCUyMHRpbGJhZ2UuJTNDJTJGcCUzRSUwQQ==[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;Atteck_section&#8221;][vc_column][vc_row_inner css=&#8221;.vc_custom_1470750636337{margin-bottom: 45px !important;}&#8221;][vc_column_inner][vc_column_text el_class=&#8221;SLA_heading&#8221;]<\/p>\n<h3 style=\"text-align: center;\">DDoS angrebstyper<\/h3>\n<p style=\"text-align: center;\">cHosting beskytter jer for flere typer af DDoS angreb, b\u00e5de volume-angreb samt sofistikeret SYN flood angreb.<\/p>\n<p>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner equal_height=&#8221;yes&#8221;][vc_column_inner el_class=&#8221;Atteck_left&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;Atteck_type_box&#8221; css=&#8221;.vc_custom_1553091853257{background-image: url(https:\/\/chosting.dk\/data\/2015\/05\/dots_bd_Sidebar.jpg?id=726) !important;}&#8221;]<\/p>\n<h5>Volume angreb &#8211; Layer 3<\/h5>\n<p>Angreb som typisk kommer i store m\u00e6ngder i form af massiv trafik og pakkest\u00f8rrelse. Spoofed UDP, NTP, SSDP osv.[\/vc_column_text][vc_column_text el_class=&#8221;Atteck_type_box&#8221; css=&#8221;.vc_custom_1553091862469{background-image: url(https:\/\/chosting.dk\/data\/2015\/05\/dots_bd_Sidebar.jpg?id=726) !important;}&#8221;]<\/p>\n<h5>Protokol angreb &#8211; Layer 4<\/h5>\n<p>Samme kategori som SYN flood, at overbelaste hardware ressourcer s\u00e5som cpu, ram osv.[\/vc_column_text][\/vc_column_inner][vc_column_inner el_class=&#8221;Atteck_right&#8221; width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;Atteck_type_box&#8221; css=&#8221;.vc_custom_1553091833090{background-image: url(https:\/\/chosting.dk\/data\/2015\/05\/dots_bd_Sidebar.jpg?id=726) !important;}&#8221;]<\/p>\n<h5>SYN flood &#8211; Layer 4<\/h5>\n<p>Sofistikeret SYN flood angreb, hvor angriberen efterlader en masse halv-\u00e5bne connections. SYN, TCP ACK, osv[\/vc_column_text][vc_column_text el_class=&#8221;Atteck_type_box&#8221; css=&#8221;.vc_custom_1553091844329{background-image: url(https:\/\/chosting.dk\/data\/2015\/05\/dots_bd_Sidebar.jpg?id=726) !important;}&#8221;]<\/p>\n<h5>Applikations angreb &#8211; Layer 7<\/h5>\n<p>Angreb som er m\u00e5lrettet en applikation, f.eks. webserver, wordpress osv.[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1432903103865{background-color: #45444b !important;}&#8221; el_class=&#8221;DDos_first_section&#8221;][vc_column][vc_row_inner][vc_column_inner el_class=&#8221;Shift_right&#8221; width=&#8221;1\/2&#8243;][vc_single_image image=&#8221;1431&#8243; img_size=&#8221;full&#8221; alignment=&#8221;right&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_column_text el_class=&#8221;ready_for_action DDos_Atack&#8221;] Hvad er et DDoS-angreb? Antallet af DDoS- og DoS angreb er eksploderet p\u00e5 det seneste. N\u00e5r et angreb er st\u00f8rre end virksomhedens kapacitet, betyder det at reelle foresp\u00f8rgsler ikke l\u00e6ngere kan besvares, grundet overbelastning af linjen og systemerne. De kriminelles form\u00e5l &hellip; <a href=\"https:\/\/chosting.dk\/da\/ddos\/\" class=\"more-link\">L\u00e6s mere <span class=\"screen-reader-text\">DDoS Beskyttelse<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":2681,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templete_SSL.php","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-2472","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/pages\/2472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/comments?post=2472"}],"version-history":[{"count":0,"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/pages\/2472\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/media\/2681"}],"wp:attachment":[{"href":"https:\/\/chosting.dk\/da\/wp-json\/wp\/v2\/media?parent=2472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}