PacketsDecreaser Docs
PacketsDecreaser Docs
  • ℹ️Informations
    • Location
  • DDoS Protection
    • Informations
    • Layer 4
      • How we mitigate DDoS Attacks
        • Pre-Filter
        • Generic Filter
        • Additional Mitigation Techniques
        • Time to Mitigate
      • Known technical impact
      • Application Filters
        • Wireguard
        • OpenVPN
        • SSH
        • Teamspeak 3
      • Gamefilters
        • FiveM
          • FiveM Layer 4
          • FiveM Layer 7
        • Minecraft Java
        • Valve Source Engine
        • SCP: Secret Laboratory
        • Minecraft Bedrock
        • BeamNG MP
        • Rust
        • Factorio
        • Palworld
      • TCP-Track
    • Layer 7
      • Informations
      • Getting Started
      • SSL Guide
      • How we mitigate DDoS Attacks
        • Edge
        • Filter
        • Clean Proxy
  • Remote DDoS Protection
    • GRE Tunnel
    • Wireguard Tunnel
  • KVM vSERVER
    • Known technical impact
    • Storage vServer
      • Add Storage
      • Upgrade Storage
  • 🕹️Gameserver
    • Information
    • Gamechanger
    • Supported Games
Powered by GitBook
On this page

Was this helpful?

  1. DDoS Protection
  2. Layer 4
  3. How we mitigate DDoS Attacks

Generic Filter


What the Prefilter allows through is subsequently handled by the generic mitigation. This software is powered by a cluster of Intel Xeon or Epyc systems, equipped with Mellanox network cards, and engineered for high performance and scalability.

Protocol Attack Protection

The post-filtering can block the following types of attacks:

  • Invalid packets

  • Anomalous TCP flag combinations (e.g., no flag, SYN-FIN, SYN frag, LAND attack)

  • SYN-ACK amplification attack protection

  • IP options

  • Packet size validation (prevents 'Ping of Death')

  • TCP/UDP/SSL/ICMP flood protection

  • Per-connection traffic control

Challenge-based Authentication

Our software also utilizes various challenge-based authentication mechanisms:

  • TCP SYN cookies, SYN authentication

  • ACK authentication

  • Spoof detection

  • DNS authentication

Zero-day Automated Protection (ZAPR)

We also leverage machine learning algorithms for real-time attack pattern recognition and filtering, which offers:

  • ZAPR: Machine Learning powered attack pattern recognition

  • TCP progression tracking

  • Capability to prevent zero-day attacks

  • No pre-configuration or manual intervention needed

  • Fast, automated response

By incorporating advanced AI techniques, our system adapts to new forms of network-level attacks, offering robust security with minimal lag or disruption. This allows us to provide our users with a stable, uninterrupted experience.

PreviousPre-FilterNextAdditional Mitigation Techniques

Last updated 24 days ago

Was this helpful?