Product Advantages
-
Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
Keep your services reliable with professional and NSS Labs-certified Anti-DDoS devices.
-
Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
Accurately identify attacks from IP addresses in a blacklist that is updated daily and thoroughly eliminate potential attacks.
-
Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
Check each data packet to identify attacks and respond to threats immediately to ensure your service continuity.
-
Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.
Try Anti-DDoS for free. Enabled by default, it protects your services when they need it most, automatically adjusting to new threats to minimize its impact on normal traffic.
Application Scenarios
Website Browsing
Websites are prone to DDoS attacks, which ultimately can cause them to crash. Anti-DDoS, however, can withstand multi-layered (layer-4 to -7) attacks, which in turn improves the browsing experience.
Advantages
Gaming
Online gaming poses a considerable risk with regards to malware. Anti-DDoS protects against every form of DDoS attack to ensure a stable Internet connection.
Advantages
Functions
-
Filter out malformed packets and defend against malicious probes and scans based on RFC standards.
Filter out malformed packets and defend against malicious probes and scans based on RFC standards.
-
Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.
Defend your servers against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and state-exhaustion attacks.
-
LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag
-
Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks
-
SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods
-
Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
Zombie hosts are used to establish a large number of TCP connections to exhaust the server.
-
Defend your servers against attacks such as HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST, and HTTPS floods.
Defend your servers against attacks such as HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST, and HTTPS floods.
-
Learn of traffic status and attack trends at any time on the management console.
Learn of traffic status and attack trends at any time on the management console.
-
HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
HTTP GET/POST floods, CC attacks, HTTP Slow Header/POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks
-
DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods
-
Keep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.
Keep abreast of current defense status and configurations as well as the service traffic status and traffic scrubbing over the past 24 hours.
-
Provide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.
Provide a convenient defense overview, including the traffic cleaning frequency, peak amount of cleaned traffic, the top 10 attacked public IP addresses, and the total number of attacks that have been intercepted.