Based on the widely distributed cleaning centers around the world of Huosan Cloud, it analyzes massive attack data through self-developed protection algorithms, and combines with the global intelligent scheduling system to detect and intelligently clean various DDoS attacks (such as SYN Flood, UDP Flood, CC, etc.) at edge security nodes in real time, ensuring the stable and safe operation of user services.

Huosan Cloud anti DDoS attack solution

1、 Product Advantages

Huosan Cloud provides online DDoS protection for network assets through aggregation of CDN, AI detection, and automatic switching between CDN alliance nodes. It is also a super automated cloud network application firewall (WAF), zombie management, and L3/4 security service.

Massive resources, intelligent expansion

Multiple cleaning centers around the world, with a total network protection capacity of over 15Tbps; Single point of attack, network wide linkage

Zero deployment, zero transformation, zero operation and maintenance

One click access for quick service activation; 7 * 24 hour full network monitoring, full process professional service

Intelligent attack and defense rules+machine learning, multiple engine defense

Intelligent attack and defense rules, real-time interception of attacks; Big data+machine learning, predict trends, deploy defense strategies in advance, and actively defend

Full service support, pay on demand

Suitable for gaming, finance, e-commerce, government and other industries; Applicable to website or non website businesses, paid on demand

 

2、 Product Features

Network layer DDoS protection

Realize real-time detection and analysis of data packets, and effectively block attack packets in real time without affecting normal data packet access

Application layer DDoS protection

Defend against various common application layer attacks such as CC, TCP Data Flood, HTTP Flood, and slow connection attacks through attack and defense rules, man-machine verification, and threat intelligence base

Overseas BGP Anycast distributed traffic cleaning

Overseas DDoS traffic cleaning uses BGP Anycast technology to intelligently disperse and clean attack traffic. After cleaning, normal traffic will be reinjected

Monitoring alarm

Multi-dimensional and comprehensive monitoring and alarm services, including real-time attack monitoring and alarm, potential security risk warning, and the first time to grasp various abnormal situations on the website

Visualization data

Real-time display of protection information for various DDoS attacks. Customers can view the protection effect in real-time and understand the security status of the website based on the attack trend

 

3、 Industry Scenarios

Gaming Industry

Distributed traffic cleaning and edge access protection ensure the stability of game operation;

T-level protection capability, elastic expansion;

Customized defense strategies aimed at game business characteristics effectively intercept malicious traffic from layers 4-7

Financial industry

Provide comprehensive monitoring and alarm services to grasp business abnormalities in the first time;

7 * 24-hour self-service access, quick opening, and reduced attack losses.

Government website

Provide accurate DDoS traffic cleaning services for government websites to effectively protect against various DDoS attacks;

Analyze cloud attack data through the big data platform to improve defense accuracy;

Provide a comprehensive DDoS attack monitoring alarm function and protection data visualization platform.

E-commerce website

Single IP high protection resources ensure business stability in the event of sudden attacks on e-commerce;

Based on the big data analysis platform, comprehensively resist various DDoS attacks;

Use on demand, elastic protection, and cost reduction.

 

4、 Quick Start

(1)Website service access

Operating Steps for Configuring HTTP/HTTPS Service Access through the Console

(2)Non website service access

Operating steps for configuring non website service access through the console

(3)Release Back to Source IP

Add the advanced anti-DDoS back-to-source IP address segment to the whitelist

(4)Verify that the configuration takes effect

Verify whether the advanced defense configuration is effective

(5)Modify DNS Resolution

Modify DNS resolution so that all users’ access is cleaned by the DDoS cloud before returning to the source site

相关新闻

微信

15323421841