Product Advantages

Product Advantages

  • Great Capability

    AAD has 16+ scrubbing centers globally with Tbit/s-level defense against a wide range of network- and application-layer DDoS attacks. Services are always protected while meeting geo-specific requirements.
    AAD has 16+ scrubbing centers globally with Tbit/s-level defense against a wide range of network- and application-layer DDoS attacks. Services are always protected while meeting geo-specific requirements.
  • Instantaneous Response

    Real-time monitoring of network conditions and immediate diversion of attack traffic keep a tight lid on security risks so you can run your business without worry.
    Real-time monitoring of network conditions and immediate diversion of attack traffic keep a tight lid on security risks so you can run your business without worry.
  • Highly Reliable

    Automatic attack detection and defense policy matching provide real-time protection yielding up to 99.9% of service availability.
    Automatic attack detection and defense policy matching provide real-time protection yielding up to 99.9% of service availability.
  • 24/7 Support

    Award-winning teams provide around-the-clock support to keep your services up and running.
    Award-winning teams provide around-the-clock support to keep your services up and running.

Application Scenarios

  • Website Browsing

  • Gaming

Website Browsing

Customer Requirements

Website access is slow or blocked due to DDoS and CC attacks, resulting in the loss of users and low sales volumes.

Advantages

Application Layer Defense
AAD blocks HTTP traffic that does not comply with specified protocol specifications or fails to pass the DPI engine, and unauthorized HTTP content.
Web Security Defense
AAD protects web and mobile applications, and APIs from common threats such as OWASP Top 10.
Quick Access
Static content is cached to edge nodes. Automatically accessing the nearest cache greatly improves website access speeds.

Related Services

Gaming

Customer Requirements

DDoS attacks affect the gaming experience, causing loss of revenue and disinterest in the game from unforgiving gamers who expect top performance because milliseconds often decide victory and defeat.

Advantages

Deep Packet Inspection
Attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols can be detected in advance by filtering malformed packets and application layer traffic.
Adaptive Filtering
Big data threat analysis, baseline traffic statistics, and exception identification are used to prevent zero-day attacks.
CC Attack Defense
Instantaneous response to attacks and user identity authentication are used to further identify normal from attack traffic for precise defense.

Related Services

Functions

Functions

  • Extensive Anti-DDoS Defense

    Provides high-bandwidth and precise traffic scrubbing capabilities to effectively defend against various DDoS attacks.
    Provides high-bandwidth and precise traffic scrubbing capabilities to effectively defend against various DDoS attacks.
  • Multiple Protocols

    Adopts industry-vetted technologies to detect and protect protocols such as HTTP, HTTPS, and TCP.
    Adopts industry-vetted technologies to detect and protect protocols such as HTTP, HTTPS, and TCP.
  • Precise traffic protection
    Precise traffic protection
    Filters malformed packets and scrubs attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods.
    Filters malformed packets and scrubs attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods.
  • WAF/CC attack prevention
    WAF/CC attack prevention
    Identifies and blocks SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks to ensure your web-based services remain secure and stable.
    Identifies and blocks SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks to ensure your web-based services remain secure and stable.
  • Web security defense
    Web security defense
    Blocks HTTP traffic that does not comply with specified protocol specifications or fails to pass the DPI engine, and unauthorized HTTP content.
    Blocks HTTP traffic that does not comply with specified protocol specifications or fails to pass the DPI engine, and unauthorized HTTP content.
  • Deep packet inspection
    Deep packet inspection
    Filters malformed packets and application layer traffic to prevent such attacks as SYN floods that exploit vulnerabilities in TCP or IP protocols.
    Filters malformed packets and application layer traffic to prevent such attacks as SYN floods that exploit vulnerabilities in TCP or IP protocols.
  • Intelligent Protection for Origin Server

    Diversion from the origin server, intelligent acceleration, and zero-day attack defense
    Diversion from the origin server, intelligent acceleration, and zero-day attack defense
  • Diversion from the origin server
    Diversion from the origin server
    The domain name that is requested is resolved and returned to the IP address of the high-defense node, preventing attacks on the origin server.
    The domain name that is requested is resolved and returned to the IP address of the high-defense node, preventing attacks on the origin server.
  • Quick access
    Quick access
    Supports static content cached to the edge nodes. Automatically accessing the nearest cache greatly improves the website access speeds.
    Supports static content cached to the edge nodes. Automatically accessing the nearest cache greatly improves the website access speeds.
  • Adaptive filtering
    Adaptive filtering
    Uses big data threat analysis, baseline traffic statistics, and exception identification to prevent zero-day attacks.
    Uses big data threat analysis, baseline traffic statistics, and exception identification to prevent zero-day attacks.

Provides Scalable, On-demand Computing Resources

Learn More