{"id":51272,"date":"2019-12-31T15:09:30","date_gmt":"2019-12-31T20:09:30","guid":{"rendered":"https:\/\/www.inmotionhosting.com\/support\/?p=51272"},"modified":"2025-03-18T17:35:56","modified_gmt":"2025-03-18T21:35:56","slug":"ddos-protection-using-corero","status":"publish","type":"post","link":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/","title":{"rendered":"DDoS Protection Using Corero"},"content":{"rendered":"\n<p>Working on the internet can often be a seemingly trouble-free environment to the point that we often take it for granted. We should always keep in mind that there are people who are bent on disrupting these services. One of the attacks that can disrupt a service called <strong>DDoS attack<\/strong>. This article describes our uses of Corero to stop these types of attacks. <\/p>\n\n\n\n<p>Remember, having a managed server does not mean that your server is impervious to such attacks. When in a situation that gives you more control over your server environment and security configurations, comes greater responsibility.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#what-is-a-ddos-attack\">What is a DDoS? Attack<\/a><\/li>\n\n\n\n<li><a href=\"#how-does-it-work\">How does it work?<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-a-ddos-attack\">What is a DDoS Attack?<\/h2>\n\n\n\n<p>A DDoS (Distributed Denial of Service) attack typically comes from multiple devices with the intent of hitting a particular target on the internet. The main problem with a DDoS attack is that it can appear to be legitimate traffic. So, the protection software\/service must be able to distinguish the difference and mitigate a detected attack in order to allow for normal traffic to continue.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4ebae\"><strong>What is a DDoS attack? <\/strong> DDoS stands for <strong>D<\/strong>istributed <strong>D<\/strong>enial of <strong>S<\/strong>ervice. Basically, this type of attack aims to flood a system so that it cannot provide its service.  The service might be a web hosting service, or even a particular website.  <\/p>\n\n\n\n<p>To mitigate these attacks and provide a secure environment for your website, InMotion Hosting uses <strong><a href=\"https:\/\/www.corero.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Corero<\/a><\/strong>. They provide best-in-class real-time, DDoS attack protection that will help keep your website up and available for all of your visitors.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-it-work\">How does it work?<\/h2>\n\n\n\n<p>Security services that protect networks from attacks will rarely provide all the details of how they operate. Otherwise, they risk inadvertently revealing how to circumvent their services.<\/p>\n\n\n\n<p>A service like Corero either operates directly at a location or through a virtual link that allows it to monitor incoming traffic. This information is closely analyzed to protect the service from attacks without affecting server performance. DDoS attacks are identified by the software\/hardware, and then mitigation solutions are either enacted or provided.<\/p>\n\n\n\n<p>Corero provides software or hardware solutions that you can scale up as needed. The service also provides analytics and forensics using the traffic data that is monitored.<\/p>\n\n\n\n<p>Want to learn more about DDoS Attack types? Check out Corero&#8217;s Glossary of Terms on <a href=\"https:\/\/www.corero.com\/blog-glossary\/\" target=\"_blank\" rel=\"noreferrer noopener\">Common DDoS Attack Types<\/a>.<\/p>\n\n\n\n<p>Protect your business today with <a href=\"https:\/\/www.inmotionhosting.com\/dedicated-servers\/server-with-ddos-protection\">DDoS protected dedicated server hosting<\/a> from InMotion Hosting.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Working on the internet can often be a seemingly trouble-free environment to the point that we often take it for granted. We should always keep in mind that there are people who are bent on disrupting these services. One of the attacks that can disrupt a service called DDoS attack. This article describes our uses<a class=\"moretag\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\"> Read More ><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4299],"tags":[],"class_list":["post-51272","post","type-post","status-publish","format-standard","hentry","category-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Corero is used to Prevent DDoS Attacks | InMotion Hosting<\/title>\n<meta name=\"description\" content=\"Learn about Distributed Denial of Service attacks and how Corero is used to prevent DDoS attacks with InMotion Hosting services.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Corero is used to Prevent DDoS Attacks | InMotion Hosting\" \/>\n<meta property=\"og:description\" content=\"Learn about Distributed Denial of Service attacks and how Corero is used to prevent DDoS attacks with InMotion Hosting services.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\" \/>\n<meta property=\"og:site_name\" content=\"InMotion Hosting Support Center\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/inmotionhosting\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-31T20:09:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-18T21:35:56+00:00\" \/>\n<meta name=\"author\" content=\"InMotion Hosting Contributor\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/InMotionHosting\" \/>\n<meta name=\"twitter:site\" content=\"@InMotionHosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"InMotion Hosting Contributor\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\"},\"author\":{\"name\":\"InMotion Hosting Contributor\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/8d626175dd3b70ee90a172bdb09a460b\"},\"headline\":\"DDoS Protection Using Corero\",\"datePublished\":\"2019-12-31T20:09:30+00:00\",\"dateModified\":\"2025-03-18T21:35:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\"},\"wordCount\":405,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\",\"name\":\"How Corero is used to Prevent DDoS Attacks | InMotion Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\"},\"datePublished\":\"2019-12-31T20:09:30+00:00\",\"dateModified\":\"2025-03-18T21:35:56+00:00\",\"description\":\"Learn about Distributed Denial of Service attacks and how Corero is used to prevent DDoS attacks with InMotion Hosting services.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inmotionhosting.com\/support\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS Protection Using Corero\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#website\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"name\":\"InMotion Hosting Support Center\",\"description\":\"Web Hosting Support &amp; Tutorials\",\"publisher\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#organization\",\"name\":\"InMotion Hosting\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"contentUrl\":\"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg\",\"width\":696,\"height\":696,\"caption\":\"InMotion Hosting\"},\"image\":{\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/inmotionhosting\/\",\"https:\/\/x.com\/InMotionHosting\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/8d626175dd3b70ee90a172bdb09a460b\",\"name\":\"InMotion Hosting Contributor\",\"description\":\"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/inmotion-hosting\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting\"],\"url\":\"https:\/\/www.inmotionhosting.com\/support\/author\/arn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Corero is used to Prevent DDoS Attacks | InMotion Hosting","description":"Learn about Distributed Denial of Service attacks and how Corero is used to prevent DDoS attacks with InMotion Hosting services.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/","og_locale":"en_US","og_type":"article","og_title":"How Corero is used to Prevent DDoS Attacks | InMotion Hosting","og_description":"Learn about Distributed Denial of Service attacks and how Corero is used to prevent DDoS attacks with InMotion Hosting services.","og_url":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/","og_site_name":"InMotion Hosting Support Center","article_publisher":"https:\/\/www.facebook.com\/inmotionhosting\/","article_published_time":"2019-12-31T20:09:30+00:00","article_modified_time":"2025-03-18T21:35:56+00:00","author":"InMotion Hosting Contributor","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/InMotionHosting","twitter_site":"@InMotionHosting","twitter_misc":{"Written by":"InMotion Hosting Contributor","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#article","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/"},"author":{"name":"InMotion Hosting Contributor","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/8d626175dd3b70ee90a172bdb09a460b"},"headline":"DDoS Protection Using Corero","datePublished":"2019-12-31T20:09:30+00:00","dateModified":"2025-03-18T21:35:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/"},"wordCount":405,"commentCount":0,"publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/","url":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/","name":"How Corero is used to Prevent DDoS Attacks | InMotion Hosting","isPartOf":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#website"},"datePublished":"2019-12-31T20:09:30+00:00","dateModified":"2025-03-18T21:35:56+00:00","description":"Learn about Distributed Denial of Service attacks and how Corero is used to prevent DDoS attacks with InMotion Hosting services.","breadcrumb":{"@id":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inmotionhosting.com\/support\/security\/ddos-protection-using-corero\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inmotionhosting.com\/support\/"},{"@type":"ListItem","position":2,"name":"DDoS Protection Using Corero"}]},{"@type":"WebSite","@id":"https:\/\/www.inmotionhosting.com\/support\/#website","url":"https:\/\/www.inmotionhosting.com\/support\/","name":"InMotion Hosting Support Center","description":"Web Hosting Support &amp; Tutorials","publisher":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inmotionhosting.com\/support\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.inmotionhosting.com\/support\/#organization","name":"InMotion Hosting","url":"https:\/\/www.inmotionhosting.com\/support\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/","url":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","contentUrl":"https:\/\/www.inmotionhosting.com\/support\/wp-content\/uploads\/2023\/02\/inmotion-hosting-logo-yoast.jpg","width":696,"height":696,"caption":"InMotion Hosting"},"image":{"@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/inmotionhosting\/","https:\/\/x.com\/InMotionHosting"]},{"@type":"Person","@id":"https:\/\/www.inmotionhosting.com\/support\/#\/schema\/person\/8d626175dd3b70ee90a172bdb09a460b","name":"InMotion Hosting Contributor","description":"InMotion Hosting contributors are highly knowledgeable individuals who create relevant content on new trends and troubleshooting techniques to help you achieve your online goals!","sameAs":["https:\/\/www.linkedin.com\/company\/inmotion-hosting\/","https:\/\/x.com\/https:\/\/twitter.com\/InMotionHosting"],"url":"https:\/\/www.inmotionhosting.com\/support\/author\/arn\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"primary_category":{"id":4299,"name":"Security","slug":"security","link":"https:\/\/www.inmotionhosting.com\/support\/security\/"},"_links":{"self":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/51272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/comments?post=51272"}],"version-history":[{"count":6,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/51272\/revisions"}],"predecessor-version":[{"id":129751,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/posts\/51272\/revisions\/129751"}],"wp:attachment":[{"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/media?parent=51272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/categories?post=51272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inmotionhosting.com\/support\/wp-json\/wp\/v2\/tags?post=51272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}