-
Website Browsing
-
Gaming
Website Browsing
Websites are prone to DDoS attacks, which ultimately can cause them to crash. Anti-DDoS, however, can withstand multi-layered (layer-4 to -7) attacks, which in turn improves the browsing experience.
Advantages
Stable Services
Defends against 100+ types of transmission layer and application layer DDoS attacks to ensure website stability.
Reliable Links
Defends against reflection and amplification attacks to ensure link reliability.
Completely Free
With just the click of a button, get up to 5 Gbit/s of free protection.
Gaming
Online gaming poses a considerable risk with regards to malware. Anti-DDoS protects against every form of DDoS attack to ensure a stable Internet connection.
Advantages
Low Latency
When an attack is detected, proprietary V-ISA reputation technology is utilized to help prioritize online gameplay.
Instantaneous Response
Automates packet detection and policy matching to ensure a response time of mere seconds.
Completely Free
With just the click of a button, get up to 5 Gbit/s of free protection.
Functions
-
Filter Malformed and Probe Packets
Filters malformed packets and defends against scanning and probing attacks based on RFC standards.
-
Defend Against Network Transmission–based Attacks
Effectively defends against attacks such as SYN, SYN-ACK, FIN, RST, UDP, ICMP Flood, and TCP connection exhaustion.
Malformed Packets
LAND, Fraggle, Smurf, Winnuke, Ping of Death, Tear Drop, and TCP Error Flag
Probe Packets
Port scanning, address scanning, TRACERT control packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
TCP/UDP/ICMP Flood Attacks
SYN/SYN-ACK/ACK Flood, FIN Flood, RST Flood, TCP/UDP Fragment Flood, UDP Flood, and ICMP Flood attacks
TCP Connection Exhaustion Attacks
In these attacks, attackers use zombie hosts to establish a large number of TCP connections with the target server to exhaust the server.
-
Prevent Application Layer Threats
Effectively prevents attacks such as HTTP Get, Post Flood, CC, HTTP Slow Header/Post, and HTTPS Flood.
-
Display Attack Trends and Traffic Reports
Uses a user-friendly platform to show real-time service traffic and attack trends.
Web Application Attacks
HTTP Get/Post Flood, CC, HTTP Slow Header/Post, SSL DoS/DDoS, RUDY, LOIC, and WordPress attacks
DNS/SIP Attacks
DNS Query Flood, DNS Reply Flood, DNS cache poisoning, and SIP Flood/SIP Methods Flood attacks such as Register Flood, Deregistration Flood, Authentication Flood, and Call Flood
IP Address Monitoring
Displays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.
Defense Summary
A comprehensive defense summary, detailing important protection metrics, is provided. Furthermore, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.