Glossary

Kaspersky DDoS Protection, System

Software and hardware complex designed to detect and filter DDoS attacks

DDoS attack, attack

DDoS attack is a distributed attack on a computer system which is carried out simultaneously from a large number of computers The attack is aimed at bringing the computer system to failure, i.e. to create the conditions in which legitimate users cannot access the resources provided, or access is unstable

Anomaly

Deviation of real traffic values from statistical values The presence of Anomaly is not a guaranteed sign of attack – only detailed analysis of the traffic allows making a conclusion about attack

Customer administrator

Portal users who have administrator privileges can assign roles to other Portal users, and can create new users with the selected role

Protected Resource

Customer's network service protected by the System Protected Resource is defined by an IP address or IP addresses and a domain name or domain names

Personal Account, Portal

System component representing a web interface, which is intended for interaction of Customer's employee with the System

Technical Support:

Kaspersky DDoS Protection technical specialists who work directly with the System: connect new and support existing Customers, reflect attacks and conduct its analysis

Filtration profile

Bundle of port and protocol through which the data of the Protected Resource is transmitted

Upstream

A Server that hosts the Customer's resource. Traffic from the Kaspersky DDoS Protection proxy servers is forwarded to the upstream

IP hash balancing between upstreams

Method of load balancing on a resource between customer servers

TLS certificate

Digital certificate that authenticates a website's identity and enables an encrypted connection

Webhook

Method of notifying the customer about an event that occurred in the system using messages. The messages are sent by HTTPS callback method using the TLS protocol

CAPTCHA

An automatically generated test that allows to distinguish bots from real website users

RUNNING configuration

Customer's connection configuration applied in production environment

CANDIDATE configuration

Customer's connection configuration in the state of editing and not applied in production environment. It appears when a user makes changes in the Settings block

DIFF configuration

Customer's connection display mode which highlights the differences between CANDIDATE configuration and RUNNING configuration

Filtering rule

A configurable System module used to analyze and filter incoming traffic based on specified parameters to detect and block suspicious or malicious activity

Page top