Product Advantages
Product Advantages
-
Highly Reliable
Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices. -
Fully Accurate
Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
-
Instantaneous Response
Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity. -
Completely Free
Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.
Functions
Functions
-
Malformed and Probe Packet Filtering
Filter out malformed packets and defend against malicious probes and scans based on RFC standards.Filter out malformed packets and defend against malicious probes and scans based on RFC standards. -
Defense Against Network and Transport Layer Attacks
Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.
-
Malformed packetsMalformed packetsLAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error FlagLAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
-
Probes and scansProbes and scansPort scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacksPort scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
-
TCP/UDP/ICMP flood attacksTCP/UDP/ICMP flood attacksSYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floodsSYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
-
State-exhaustion attacksState-exhaustion attacksZombie hosts are used to establish a large number of TCP connections to exhaust the server.Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
-
Application Layer Threat Prevention
Defend your servers against attacks such as HTTP Get/Post Floods, CC attacks, HTTP Slow Header/Post, and HTTPS Floods.Defend your servers against attacks such as HTTP Get/Post Floods, CC attacks, HTTP Slow Header/Post, and HTTPS Floods. -
Attack Trend and Traffic Report Display
Learn of traffic status and attack trends at any time on the management console.Learn of traffic status and attack trends at any time on the management console.
-
Web application attacks
Web application attacks
HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
-
DNS/SIP attacksDNS/SIP attacksDNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floodsDNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
-
IP address monitoringIP address monitoringKeep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.Keep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.
-
Defense statisticsDefense statisticsProvide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.Provide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.