AUTOMATED RECOGNITION OF ATTACK PATTERNS
In addition to recognizing an attack based on the amount of traffic or the number of packets, we at WeHost will be able to clearly define the actual attack and then to specifically home in on and react to that particular type of attack. For example, a UDP flood with 500k pps is harmless for a server. A 500k SYN packet, however, could pose a problem. Our DDoS protection tools can detect precisely this type of difference.