Product Advantages

Product Advantages

  • Highly Reliable

    Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
    Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
  • Fully Accurate

    Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
    Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
  • Instantaneous Response

    Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
    Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
  • Completely Free

    Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.
    Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.

Application Scenarios

  • Website Browsing

  • Gaming

Website Browsing

Website Browsing

Websites are prone to DDoS attacks, which ultimately can cause them to crash. Anti-DDoS, however, can withstand multi-layered (layer-4 to -7) attacks, which in turn improves the browsing experience.

Advantages

Stable Services

Anti-DDoS defends against 100+ types of transmission layer and application layer DDoS attacks to ensure website stability.

Reliable Links

Anti-DDoS defends against reflection and amplification attacks to ensure link reliability.

Completely Free

With just the click of a button, get up to 500 Mbit/s of free protection.

Related Services

Gaming

Gaming

Online gaming poses a considerable risk with regards to malware. Anti-DDoS protects against every form of DDoS attack to ensure a stable Internet connection.

Advantages

Low Latency

When an attack is detected, proprietary V-ISA reputation technology is utilized to help prioritize online gameplay.

Instantaneous Response

Anti-DDoS automates packet detection and policy matching to ensure a response time of mere seconds.

Completely Free

With just the click of a button, get up to 500 Mbit/s of free protection.

Related Services

Functions

Functions

  • Malformed and Probe Packet Filtering

    Filter out malformed packets and defend against malicious probes and scans based on RFC standards.
    Filter out malformed packets and defend against malicious probes and scans based on RFC standards.
  • Defense Against Network and Transport Layer Attacks

    Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.
    Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.
  • Malformed packets
    Malformed packets
    LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
    LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
  • Probes and scans
    Probes and scans
    Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
    Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
  • TCP/UDP/ICMP flood attacks
    TCP/UDP/ICMP flood attacks
    SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
    SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
  • State-exhaustion attacks
    State-exhaustion attacks
    Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
    Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
  • Application Layer Threat Prevention

    Defend your servers against attacks such as HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST, and HTTPS floods.
    Defend your servers against attacks such as HTTP GET/POST Floods, CC attacks, HTTP Slow Header/POST, and HTTPS floods.
  • Attack Trend and Traffic Report Display

    Learn of traffic status and attack trends at any time on the management console.
    Learn of traffic status and attack trends at any time on the management console.
  • Web application attacks

    Web application attacks

    HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks

    HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks

  • DNS/SIP attacks
    DNS/SIP attacks
    DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
    DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
  • IP address monitoring
    IP address monitoring
    Keep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.
    Keep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.
  • Defense statistics
    Defense statistics
    Provide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.
    Provide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.
Usage Guides

Register with HUAWEI CLOUD to get free services

Register Now