Product Advantages

  • Great Capability

    Defend your servers against a wide range of network and transport layer DDoS attacks with globally distributed scrubbing centers that provide Tbit/s protection capacity.

    Defend your servers against a wide range of network and transport layer DDoS attacks with globally distributed scrubbing centers that provide Tbit/s protection capacity.

  • Instantaneous Response

    Efficiently detect and rapidly respond to DDoS attacks before your services are impacted.

    Efficiently detect and rapidly respond to DDoS attacks before your services are impacted.

  • High Reliability

    Enjoy always-on protection, and tune your protection settings based on the detected attacks.

    Enjoy always-on protection, and tune your protection settings based on the detected attacks.

  • 24/7 Support

    Keep your services up and running with the always available and experienced DDoS mitigation staff.

    Keep your services up and running with the always available and experienced DDoS mitigation staff.

Application Scenarios

Painpoints

Website access is slow or blocked due to DDoS and CC attacks, resulting in the loss of users and low sales volumes.


Advantages

  • Application Layer Defense

    AAD blocks unauthorized HTTP traffic that does not comply with HTTP protocol specifications or fails to pass through the DPI engine.

  • Web Security Defense

    AAD protects web and mobile applications, and APIs from common threats such as OWASP Top 10.

  • Quick Access

    Static content is cached to edge nodes. Automatically accessing the nearest cache greatly improves website access speeds.

Related Services

Painpoints

DDoS attacks affect the gaming experience, causing loss of revenue and driving off gamers, who have little tolerance for anything less that top performance because milliseconds of delay are often the difference between victory and defeat.


Advantages

  • Deep Packet Inspection

    Attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols can be detected in advance by filtering out malformed packets and application layer traffic.

  • Adaptive Filtering

    Big data threat analysis, baseline traffic statistics, and exception identification are used to protect against zero-day attacks.

  • CC Attack Defense

    Instantaneous response to attacks and user identity authentication are used to further identify normal from attack traffic for precise defense.

Related Services

Functions

  • 360-degree DDoS Protection

    Defend against a range of DDoS attacks. Enjoy powerful protection and precise traffic scrubbing capability.

    Defend against a range of DDoS attacks. Enjoy powerful protection and precise traffic scrubbing capability.

  • Multiple Protocols

    Use advanced traffic detection and protection technologies to defend your servers that use HTTP, HTTPS, and TCP against attacks.

    Use advanced traffic detection and protection technologies to defend your servers that use HTTP, HTTPS, and TCP against attacks.

  • Precise traffic protection
    Precise traffic protection

    Detect and scrub attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods, by filtering malformed packets.

    Detect and scrub attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods, by filtering malformed packets.

  • WAF/CC attack prevention
    WAF/CC attack prevention

    Identify and block SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks. Keep your web services secure and stable.

    Identify and block SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks. Keep your web services secure and stable.

  • Web protection
    Web protection

    Block the unauthorized HTTP traffic that does not comply with HTTP protocol specifications or fails to pass through the DPI engine.

    Block the unauthorized HTTP traffic that does not comply with HTTP protocol specifications or fails to pass through the DPI engine.

  • Deep packet inspection (DPI)
    Deep packet inspection (DPI)

    Detect attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols in advance by filtering malformed packets and application layer traffic.

    Detect attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols in advance by filtering malformed packets and application layer traffic.

  • Intelligent Protection

    Hide your servers from zero-day attacks.

    Hide your servers from zero-day attacks.

  • Hidden server
    Hidden server

    Provide you services from special, high-defense IP addresses so your servers can be kept safe and secure.

    Provide you services from special, high-defense IP addresses so your servers can be kept safe and secure.

  • Quick access
    Quick access

    Cache static content to edge nodes. The nearest cache node can be accessed, speeding up your access to websites.

    Cache static content to edge nodes. The nearest cache node can be accessed, speeding up your access to websites.

  • Adaptive filtering
    Adaptive filtering

    Use big data threat analysis, baseline traffic statistics, and exception identification to protect against zero-day attacks.

    Use big data threat analysis, baseline traffic statistics, and exception identification to protect against zero-day attacks.

Sign up and start an amazing cloud journey

Try Free