Copyright 2015, Imperva. All rights reserved.

Under Attack? Click Here!

DDoS Threat Landscape Report:

Discover the latest DDoS attack trends.
Learn about current & emerging threats.

Excerpt: "The most common network attack method is a combination of two types of SYN flood attacks – one using regular SYN packets and another using large SYN (above 250 bytes) packets. In this scenario, both attacks are executed at the same time, with the regular SYN packets used to exhaust server resources (e.g., CPU) and large SYN packets used to cause network saturation..."

Download to learn more about:

  • Multi-vector network layer attacks
  • Attackers' "Weapons of Choice"
  • Botnets' geo-locations and activity patterns
  • Technological evolution of DDoS bots

Download the Report

How Incapsula Works?

Once activated through a simple DNS change and without any hardware or software, Incapsula’s global CDN routes all traffic to your website and web applications, intelligently profiling this traffic in real-time to block even the latest web threats.

Our PCI-certified Web Application Firewall thwarts all OWASP threats, from scrapers and spammers to sophisticated Injection and XSS attacks, in addition to mitigating all network and application DDoS attacks.

Meanwhile, outgoing traffic is accelerated and optimized with Incapsula's caching and optimization techniques, keeping welcome visitors speeding through.

DDoS Report


Incapsula's DDoS Protection Service can detect and block the following DDoS attacks. Note that Incapsula proxies web requests, so any network layer DDoS attacks are never relayed to the clients origin servers. Therefore, Incapsula's DDoS protection will mitigate all network level attacks.
  • TCP Fragment
  • UDP
  • ICMP
  • IGMP
  • HTTP Flood
  • Brute FloodT
  • Connection Flood
  • Slowloris
  • Spoofing
  • DNS flood
  • Mixed SYN+UDP or ICMP+UDP flood
  • Ping of Death
  • Smurf
  • Reflected ICMP and UDP
  • Teardrop
  • Zero-day DDoS attacks
  • Attacks against common web servers such as Apache and II
  • As well as other attacks ...