For now, e-mail me at email@example.com for servers. Currently accepting Bitcoin and PayPal.
The attack is detected by using real-time analytics from the netflow of the routers which analyze 1/2000 of the traffic. The vacuum checks the report and compares it's characteristics to a DDoS attack. If the algorithm matches, mitigation automatically starts. It's measured in Packets Per Seconds (PPS), and includes several protocols like DNS, ICMP, IP fragmentation - Null and Private, TCP Null - RST - SYN - ACK, UDP.
The vacuuming is used to channel the DDoS load with a 15Tbit/s network. The vacuum is sent across 10 different datacenters, and they all abosrb the traffic at a capacity of 4Tbit/s.
We'll get you sorted out with the right hardware and software solutions for your home/business network. Security is a habit, and it's fun!
With knowledge in a multitude of programming languages, we are able to tailor the experience for the end-user.
Staying productive is important to us, as idle hands don't get the job done. Constantly learning and implementing continuous integration, and putting new environments and tools into production while keeping all of your information secure.