Kaspersky DDoS Protection, System |
Software and hardware complex designed to detect and filter DDoS attacks |
DDoS attack, attack |
DDoS attack is a distributed attack on a computer system which is carried out simultaneously from a large number of computers The attack is aimed at bringing the computer system to failure, i.e. to create the conditions in which legitimate users cannot access the resources provided, or access is unstable |
Anomaly |
Deviation of real traffic values from statistical values The presence of Anomaly is not a guaranteed sign of attack – only detailed analysis of the traffic allows making a conclusion about attack |
Customer administrator |
Portal users who have administrator privileges can assign roles to other Portal users, and can create new users with the selected role |
Protected Resource |
Customer's network service protected by the System Protected Resource is defined by an IP address or IP addresses and a domain name or domain names |
Personal Account, Portal |
System component representing a web interface, which is intended for interaction of Customer's employee with the System |
Technical Support: |
Kaspersky DDoS Protection technical specialists who work directly with the System: connect new and support existing Customers, reflect attacks and conduct its analysis |
Filtration profile |
Bundle of port and protocol through which the data of the Protected Resource is transmitted |
Upstream |
A Server that hosts the Customer's resource. Traffic from the Kaspersky DDoS Protection proxy servers is forwarded to the upstream |
IP hash balancing between upstreams |
Method of load balancing on a resource between customer servers |
TLS certificate |
Digital certificate that authenticates a website's identity and enables an encrypted connection |
Webhook |
Method of notifying the customer about an event that occurred in the system using messages. The messages are sent by HTTPS callback method using the TLS protocol |
CAPTCHA |
An automatically generated test that allows to distinguish bots from real website users |
RUNNING configuration |
Customer's connection configuration applied in production environment |
CANDIDATE configuration |
Customer's connection configuration in the state of editing and not applied in production environment. It appears when a user makes changes in the Settings block |
DIFF configuration |
Customer's connection display mode which highlights the differences between CANDIDATE configuration and RUNNING configuration |
Filtering rule |
A configurable System module used to analyze and filter incoming traffic based on specified parameters to detect and block suspicious or malicious activity |