Protect your game servers against high-capacity

DDoS attacks

According to Statista, 79% of all DDoS attacks occur in the gaming industry. Choose a reliable DDoS protection and don't worry about server security ever again.

  • Instant reaction to an attack

  • Guaranteed availability (SLA) 99,9%

  • Technical support 24/7/365

  • albion
  • wargaming
  • redfox

Features of DDoS attacks in 2022

In 2022, high-capacity attacks are no longer rare, so the filtering center must be able to handle large volumes of traffic with minimal delays.

Gcore has a network of servers distributed around the world. This allows you to effectively defend your servers against high volume attacks by balancing traffic between these systems.

Technological advantages

Unlimited protection against L3 and L4 attacks
Ability to filter L7 attacks
Protection against attacks exploiting SSL/TLS vulnerabilities
Protection from the first packet
Ability to connect from anywhere in the world through a GRE tunnel
High degree of customization: ability to adapt L7-attack filtering rules to any application
Automatic notification service

Guaranteed protection against all types of DDoS attacks

  • Flood/Volumetric

    Overflow attacks on a server:

    In case of significant attacks, the data center will be forced to block this server

    Network interface overflow

    Data center may suffer from high-powered attacks

  • Connection

    Attacks on TCP protocol stack

  • Volumetric

    High-frequency and low-frequency attacks on the application

Gcore benefits

  • Huge bandwidth capacity of the Gcore network, allowing it to handle dozens of terabits of traffic.
  • High degree of customization: the ability to adapt L7 attack filtering rules to any application.
  • Complex protection algorithms make it impossible to bypass our scrubbing system, even if attackers disguise traffic for attacks as legitimate game traffic.
  • An advanced scrubbing system capable of receiving, calculating and rendering harmless attacks of hundreds of gigabits per second.
  • 99.9% SLA for web security service.

How to connect and manage the protection?

1
Submit a request to enable protection.
2
The protection is configured to fit your infrastructure. For maximum efficiency, we analyze your traffic profile and come up with a set of effective measures.
3
We inform technical support about any abnormalities right away. Usually, attacks are detected within 1 minute.
4
If traffic cleaning is needed, all incoming traffic is routed through the filtering platform. This results in only clean traffic arriving at your servers via a dedicated channel.

Locations Around The World

Amsterdam
San Jose
Chicago
Ashburn
São Paulo
London
Frankfurt
Istanbul
Singapore
Hong Kong
Seoul
Tokyo
Sydney

Success stories

  • How we protected Albion Online against complex and massive DDoS attacks
    Albion Online is a true cross-platform MMO available on Windows, MacOS, Linux, iOS, and Android.
    The IP address and port of the server (in this case, the address of the game server and the application port) were targeted by the attacker. In particularly difficult cases, an attacker can guess the size (window) of a legitimate packet and generate the necessary bitrate for the SRC_IP and DST_IP pair (one flow). This effectively obstructs filtering. If an attack is well-generated, it is almost impossible to distinguish legitimate (game) traffic from illegitimate traffic by means of analysis.
    Building a regexp close to the application traffic pattern is a difficult but possible task. It all depends on the attacker’s persistence.
    There are not that many countermeasures to filter such attacks.
  • How we protected Wargaming against DDoS attacks
    Wargaming is one of the world’s largest publishers and developers in the free-to-play MMO market. Last year, Gcore’ defense systems detected an attack aimed at Wargaming servers.
    The total volume of the attack was 253Gbps, and it lasted about 15minutes. The attackers used the UDP Flood method. By using filter rules to protect against well-known amplification attacks, we deflected some of the malicious traffic at our border routers. We redirected the other part to our cleaning system for deeper analysis to make a more informed decision about blocking.

Get a guaranteed 20% discount

Tell us about the challenges of your business, and we’ll help you grow in any country in the world.