Based on the widely distributed cleaning centers around the world of Huosan Cloud, it analyzes massive attack data through self-developed protection algorithms, and combines with the global intelligent scheduling system to detect and intelligently clean various DDoS attacks (such as SYN Flood, UDP Flood, CC, etc.) at edge security nodes in real time, ensuring the stable and safe operation of user services.
1、 Product Advantages
Huosan Cloud provides online DDoS protection for network assets through aggregation of CDN, AI detection, and automatic switching between CDN alliance nodes. It is also a super automated cloud network application firewall (WAF), zombie management, and L3/4 security service.
Massive resources, intelligent expansion
Multiple cleaning centers around the world, with a total network protection capacity of over 15Tbps; Single point of attack, network wide linkage
Zero deployment, zero transformation, zero operation and maintenance
One click access for quick service activation; 7 * 24 hour full network monitoring, full process professional service
Intelligent attack and defense rules+machine learning, multiple engine defense
Intelligent attack and defense rules, real-time interception of attacks; Big data+machine learning, predict trends, deploy defense strategies in advance, and actively defend
Full service support, pay on demand
Suitable for gaming, finance, e-commerce, government and other industries; Applicable to website or non website businesses, paid on demand
2、 Product Features
Network layer DDoS protection
Realize real-time detection and analysis of data packets, and effectively block attack packets in real time without affecting normal data packet access
Application layer DDoS protection
Defend against various common application layer attacks such as CC, TCP Data Flood, HTTP Flood, and slow connection attacks through attack and defense rules, man-machine verification, and threat intelligence base
Overseas BGP Anycast distributed traffic cleaning
Overseas DDoS traffic cleaning uses BGP Anycast technology to intelligently disperse and clean attack traffic. After cleaning, normal traffic will be reinjected
Monitoring alarm
Multi-dimensional and comprehensive monitoring and alarm services, including real-time attack monitoring and alarm, potential security risk warning, and the first time to grasp various abnormal situations on the website
Visualization data
Real-time display of protection information for various DDoS attacks. Customers can view the protection effect in real-time and understand the security status of the website based on the attack trend
3、 Industry Scenarios
Gaming Industry
Distributed traffic cleaning and edge access protection ensure the stability of game operation;
T-level protection capability, elastic expansion;
Customized defense strategies aimed at game business characteristics effectively intercept malicious traffic from layers 4-7
Financial industry
Provide comprehensive monitoring and alarm services to grasp business abnormalities in the first time;
7 * 24-hour self-service access, quick opening, and reduced attack losses.
Government website
Provide accurate DDoS traffic cleaning services for government websites to effectively protect against various DDoS attacks;
Analyze cloud attack data through the big data platform to improve defense accuracy;
Provide a comprehensive DDoS attack monitoring alarm function and protection data visualization platform.
E-commerce website
Single IP high protection resources ensure business stability in the event of sudden attacks on e-commerce;
Based on the big data analysis platform, comprehensively resist various DDoS attacks;
Use on demand, elastic protection, and cost reduction.
4、 Quick Start
(1)Website service access
Operating Steps for Configuring HTTP/HTTPS Service Access through the Console
(2)Non website service access
Operating steps for configuring non website service access through the console
(3)Release Back to Source IP
Add the advanced anti-DDoS back-to-source IP address segment to the whitelist
(4)Verify that the configuration takes effect
Verify whether the advanced defense configuration is effective
(5)Modify DNS Resolution
Modify DNS resolution so that all users’ access is cleaned by the DDoS cloud before returning to the source site