Home ci 17. security: DDoS Mitigation

17. security: DDoS Mitigation

Last updated on Aug 05, 2025

Table of Contents

  1. Compliance Measures
  2. Firewall
  3. TLS Fingerprints
  4. Access Control
  5. SAML SSO
  6. HTTPS/SSL
  7. Open System Interconnection (OSI) Model
  8. Layer 3 DDoS
  9. Layer 4 DDoS
  10. Layer 7 DDoS
  11. What to do in case of a DDoS attack
  12. Bypass System-level Mitigations
  13. Billing for DDoS
  14. Contact Us

Compliance Measures

Epycbyte ensures compliance with industry standards and regulations to provide secure solutions for your business needs.


Firewall

The firewall acts as a barrier between trusted internal networks and untrusted external networks, protecting against unauthorized access.


TLS Fingerprints

TLS fingerprinting is used to identify malicious traffic by comparing server certificates to known legitimate ones.


Access Control

Strict access control ensures that only authorized users can access sensitive data or resources.


SAML SSO

Single Sign-On (SSO) simplifies user authentication across multiple systems, reducing the need for multiple passwords.


HTTPS/SSL

Secure Sockets Layer (SSL) encrypts data during transmission to protect it from being intercepted.


Open System Interconnection (OSI) Model

The OSI model defines seven layers of networking: physical, data link, network, session, presentation, and application.


Layer 3 DDoS

Layer 3 attacks target the data link layer, flooding the network with traffic to cause congestion.


Layer 4 DDoS

Layer 4 attacks involve the transport layer, overwhelming servers with too many connections.


Layer 7 DDoS

Layer 7 attacks target the application layer, overwhelming servers with requests.


What to do in case of a DDoS attack

  1. Monitor traffic for unusual patterns.
  2. Use DDoS protection tools.
  3. Engage with security teams to analyze and mitigate threats.
  4. Update systems with patches to prevent vulnerabilities.

Bypass System-level Mitigations

To disable automatic mitigations temporarily:

  • Click the menu button in the Firewall tab.
  • Select "Disable System Mitigations."
  • Confirm in the dialog box for 24 hours.

Billing for DDoS

Epycbyte automatically mitigates L3, L4, and L7 DDoS attacks at no extra cost. You are billed for legitimate traffic and any illegitimate traffic that bypasses mitigation.


Contact Us

For support or questions, visit the Epycbyte website or contact their customer service team.