Anti-DDoS

Anti-DDoS is a traffic scrubbing service that protects resources such as Elastic Cloud Server (ECS) and Elastic Load Balance (ELB) instances from network and application layer distributed denial-of-service (DDoS) attacks. It notifies users of detected attacks instantly, ensures bandwidth availability as well as the stable and reliable running of services.

Anti-DDoS is free of charge, providing up to 5 Gbit/s of protection.

  • Professional Reliability

    Bolstered by over 17 years of defensive expertise, Huawei's Anti-DDoS systems, certified by NSS Labs, guarantee professional reliability.

  • Fully Accurate

    A constantly updated database (carrying millions of blacklisted IP addresses) coupled with a 7-layer, smart cleaning mechanism ensures accurate results.

  • Instantaneous Response

    With industry-leading technology and powerful equipment, Anti-DDoS checks each packet and responds to any attack immediately without causing service delays.

  • Completely Free

    Anti-DDoS is free of charge and instantly available upon application. It provides professional defense templates and protection threshold learning capability.

Application Scenarios
  • Website Browsing

  • Gaming

Website Browsing

Website Browsing

Websites are prone to DDoS attacks, which ultimately can cause them to crash. Anti-DDoS, however, can withstand multi-layered (layer-4 to -7) attacks, which in turn improves the browsing experience.

Advantages

Stable Services

Defends against 100+ types of transmission layer and application layer DDoS attacks to ensure website stability.

Reliable Links

Defends against reflection and amplification attacks to ensure link reliability.

Completely Free

With just the click of a button, get up to 5 Gbit/s of free protection.

Related Services

vss

hss

elb

Gaming

Gaming

Online gaming poses a considerable risk with regards to malware. Anti-DDoS protects against every form of DDoS attack to ensure a stable Internet connection.

Advantages

Low Latency

When an attack is detected, proprietary V-ISA reputation technology is utilized to help prioritize online gameplay.

Instantaneous Response

Automates packet detection and policy matching to ensure a response time of mere seconds.

Completely Free

With just the click of a button, get up to 5 Gbit/s of free protection.

Related Services

ssa

hss

elb

Functions

  • Filter Malformed and Probe Packets

    Filters malformed packets and defends against scanning and probing attacks based on RFC standards.

  • Defend Against Network Transmission–based Attacks

    Effectively defends against attacks such as SYN, SYN-ACK, FIN, RST, UDP, ICMP Flood, and TCP connection exhaustion.

Filter Malformed and Probe Packets

  • Malformed Packets

    LAND, Fraggle, Smurf, Winnuke, Ping of Death, Tear Drop, and TCP Error Flag

  • Probe Packets

    Port scanning, address scanning, TRACERT control packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks

Defend Against Network Transmission–based Attacks

  • TCP/UDP/ICMP Flood Attacks

    SYN/SYN-ACK/ACK Flood, FIN Flood, RST Flood, TCP/UDP Fragment Flood, UDP Flood, and ICMP Flood attacks

  • TCP Connection Exhaustion Attacks

    In these attacks, attackers use zombie hosts to establish a large number of TCP connections with the target server to exhaust the server.

  • Prevent Application Layer Threats

    Effectively prevents attacks such as HTTP Get, Post Flood, CC, HTTP Slow Header/Post, and HTTPS Flood.

  • Display Attack Trends and Traffic Reports

    Uses a user-friendly platform to show real-time service traffic and attack trends.

Prevent Application Layer Threats

  • Web Application Attacks

    HTTP Get/Post Flood, CC, HTTP Slow Header/Post, SSL DoS/DDoS, RUDY, LOIC, and WordPress attacks

  • DNS/SIP Attacks

    DNS Query Flood, DNS Reply Flood, DNS cache poisoning, and SIP Flood/SIP Methods Flood attacks such as Register Flood, Deregistration Flood, Authentication Flood, and Call Flood

Display Attack Trends and Traffic Reports

  • IP Address Monitoring

    Displays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.

  • Defense Summary

    A comprehensive defense summary, detailing important protection metrics, is provided. Furthermore, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.

Usage Guides

Create an Account and Experience HUAWEI CLOUD for Free

Register Now