Product Advantages

Product Advantages

  • Highly Reliable

    Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
    Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
  • Fully Accurate

    Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
    Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
  • Instantaneous Response

    Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
    Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
  • Completely Free

    Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.
    Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.

Functions

Functions

  • Malformed and Probe Packet Filtering

    Filters malformed packets and defends against scanning and probing attacks based on RFC standards.
    Filters malformed packets and defends against scanning and probing attacks based on RFC standards.
  • Defense Against Network and Transport Layer Attacks

    Effectively defends against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and TCP connection exhaustion.
    Effectively defends against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and TCP connection exhaustion.
  • Malformed packets
    Malformed packets
    LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
    LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
  • Probe packets
    Probe packets
    Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
    Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
  • TCP/UDP/ICMP flood attacks
    TCP/UDP/ICMP flood attacks
    SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
    SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
  • TCP connection exhaustion attacks
    TCP connection exhaustion attacks
    Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
    Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
  • Application Layer Threat Prevention

    Effectively prevents attacks such as HTTP Get, Post Flood, CC, HTTP Slow Header/Post, and HTTPS Flood.
    Effectively prevents attacks such as HTTP Get, Post Flood, CC, HTTP Slow Header/Post, and HTTPS Flood.
  • Attack Trend and Traffic Report Display

    Uses a user-friendly platform to show real-time service traffic and attack trends.
    Uses a user-friendly platform to show real-time service traffic and attack trends.
  • Web application attacks

    Web application attacks

    HTTP GET or POST floods, CC attacks, HTTP Slow Header or POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks

    HTTP GET or POST floods, CC attacks, HTTP Slow Header or POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks

  • DNS/SIP attacks
    DNS/SIP attacks
    DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
    DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
  • IP address monitoring
    IP address monitoring
    Displays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.
    Displays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.
  • Defense summary
    Defense summary
    Provides comprehensive defense summary with detailed and important protection metrics. In addition, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.
    Provides comprehensive defense summary with detailed and important protection metrics. In addition, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.
Usage Guides

Provides Scalable, On-demand Computing Resources

Learn More