DDoS defense

Fully effective defense against large traffic DDOS attacks + customized CC attacks Stable and highly available, simple and easy to configure

Huosan Cloud DDoS Advantages

An essential artifact to defend against DDOS and CC traffic attacks, and solve problems such as traffic attacks on websites

China Defense

  • High defense 30G

    DDOS traffic: 30Gbps/s
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    4500 /RMB
    Purchase
  • High defense 50G

    DDOS traffic: 50Gbps/s
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    5200 /RMB
    Purchase
  • High defense 100G

    DDOS traffic: 100Gbps/s
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    14000 /RMB
    Purchase
  • High defense and unlimited defense

    DDOS traffic: unlimited
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    Seek Advice From
    Consultation purchase

Overseas defense

  • High defense 50G

    DDOS traffic: 50Gbps/s
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    16000 /RMB
    Purchase
  • High defense 100G

    DDOS traffic: 100Gbps/s
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    26000 /RMB
    Purchase
  • High defense 500G

    DDOS traffic: 500Gbps/s
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    100000 /RMB
    Purchase
  • High defense and unlimited defense

    DDOS traffic: unlimited
    Customized anti CC: Advanced
    Number of connections: unlimited
    Protective layer: four/seven layers
    Defense Node: Independent IP
    Customized dynamic interface protection: support
    CC protection accidental injury rate: 0%
    Multi source load: supported
    Seek Advice From
    Consultation purchase

Why Choose Us

Fully effective defense against large traffic DDOS attacks + customized CC attacks

Stable and highly available

The server adopts multi-regional distributed deployment, mature and perfect disaster recovery redundancy and intelligent load balancing to ensure the stability and high availability of the system.

gpp_good

Safety

Web security protection based on cloud computing realizes the collaborative defense mechanism of "one network attack, whole network protection".

Simple and easy to configure

Quick access through DNS resolution, users do not need to deploy any equipment, do not need any network changes, server configuration changes.

app_registration

Solution

Develop exclusive solutions for various industries such as finance, games, government, military industry, and enterprises.

Real-time report

Detailed reports keep abreast of the usage, real-time tracking defense system displays all attacks.

7x24 hours service

Security experts 7x24 hours of monitoring and service support to ensure that you are always free from failures or any security threats.

Product Features

火伞云提供T级别DDoS攻击防护

Anti-DDoS Pro

Anti-DDoS Pro provides external services through the Anti-DDoS Pro proxy source IP, and diverts malicious attack traffic to the Anti-DDoS Pro for cleaning, ensuring that important services are not interrupted by attacks.

DDoS/CC attack protection

Provides high bandwidth, accurate and reliable attack cleaning capabilities, and effectively protects against various types of DDoS attacks and application layer CC attacks

Elastic Bandwidth Guard

Elastic bandwidth protection is provided on the basis of guaranteed bandwidth, and users can flexibly choose the highest T-level protection bandwidth

Full business support

Support protocol forwarding such as TCP/UDP/HTTP/Websocket(s), support traffic load balancing, evenly distribute business traffic, and support source IP geographic location filtering

Attack protection report display

Provide DDoS/CC attack defense statistics, provide reports to display real-time and historical attack conditions, and provide security event display

DDoS Native Protection

Native DDoS protection takes effect on the IP on the cloud without changing the IP address. Through simple configuration, the security capability provided by native DDoS protection can be directly loaded on the cloud service, improving the security protection capability of the cloud service and ensuring business on the cloud service Safety

Transparent deployment

Defend against DDoS attacks through the native BGP network, without changing the business structure, without increasing network delay, and adding protection with one click

Account-level multi-IP sharing protection

Support cloud resource sharing under the same account DDoS protection capability, helping enterprises to quickly improve the overall network security protection level of the account

Linkage Anti-DDoS Automatic Scheduling

Supports DDoS native protection IP linkage with high-defense service resources, automatically switching attack traffic

IPv6 support

Help enterprises quickly build IPv6 DDoS security protection capabilities

火伞云提供百万级别的CC攻击防护
火伞云提供T级别DDoS攻击防护

Secure Traffic Scheduling

By default, the DDoS native protection capabilities on all clouds are raised to a higher protection and cleaning threshold. When the DDoS attack traffic reaches a certain threshold, the DDoS native protection IP is supported to link with the high-defense service resources, and the attack traffic is automatically switched to the high-defense IP service. , effectively relieve the pressure of cloud-native protection

Rapid Detection Response

Advanced packet-by-packet detection mechanism, second-level response to various attacks and threats; powerful cleaning device performance, extremely low cleaning delay

Switching in seconds

Access through the CNAME domain name, and switch to the corresponding high-defense node in seconds

Support multiple resource protection switching

Cloud-native protection to high-defense resource linkage supports multiple resource protection, including ECS, ELB, EIP, WAF and other network resources

Support ladder scheduling

When there is an attack, switch to cloud-native protection resources for full protection. When the maximum protection capability of cloud-native is exceeded, it will be further scheduled to high-defense nodes through ladder scheduling.

DDoS Mitigation Assistant

For customers who are at risk of DDoS attacks, give expert advice to help customers make DDoS service specification recommendations, configuration recommendations, and defense strategy recommendations

DDOS Attack Mitigation Standard Assistant

DDoS protection service configuration and activation After the customer completes the service purchase according to the "DDoS protection service recommendation" plan, help the customer complete the configuration of the DDoS protection solution. Ensure effective implementation of DDoS protection solutions.
According to the customer's business scenario and risk assessment, a DDoS protection product package plan is given, such as how to choose the cloud DDoS high-defense package, the number of protected IPs, the selection of guaranteed bandwidth, etc.

DDOS attack mitigation professional assistant

Provide special configuration tuning for customer business systems and risk levels (such as historical attacks, blackmail details, etc.). The required additional DDoS protection service fee is not included in the Anti-DDoS Mitigation Assistant Professional Edition

DDoS attack mitigation on-duty assistant

When the customer monitors the occurrence of DDoS attacks, arrange DDoS protection experts to be on duty online, and set up a war room through welink and WeChat to provide special protection. Note that a single DDoS attack mitigation assistant only provides a 24-hour on-duty service. If the attack lasts longer than 24 hours, additional fees will be charged.

火伞云提供游戏盾网络拥塞调度

Solution

  • Game solution

    Game solution

    In view of the vulnerability of the game industry business and other characteristics, the game DDoS defense solution is specially launched to solve the DDoS attack problems faced by the game, and there is no upper limit to defend against various DDoS attacks and CC attacks. Provide multi-level security defense solutions and 7*24 hours of operation and maintenance support to provide all-round protection for customers in the game industry.

  • E-commerce industry solutions

    E-commerce industry solutions

    Develop exclusive solutions for high concurrency in the e-commerce industry, spam traffic, malicious order swiping, sudden large-scale malicious attacks, and various vulnerability attacks to help e-commerce customers deal with various business problems, ensure the safety of e-commerce transactions, and e-commerce activities Done successfully!

  • Blockchain solution

    Blockchain solution

    The main purpose of hackers attacking digital currency trading platforms is to steal data, accounting for up to 48%, followed by malicious attacks from competitors, including CC and DDoS malicious traffic attacks. Huosan Cloud has ten years of security experience, multiple protection + cloud big data, and develops exclusive security solutions for various virtual currency trading platforms.

  • Financial Industry Solutions

    Financial Industry Solutions

    Tailor-made personalized security solutions for large, medium and small banks, insurance, P2P, credit, pawn, guarantee, crowdfunding, etc., three-dimensional protection of the security mechanism, resisting various malicious attacks, through the linkage analysis of big data logs, real-time public opinion monitoring, Reduce the risk of financial fraud and improve the safety and reputation of the financial industry.

Partner

Huosan Cloud's complete service system escorts the digitalization of enterprises to the cloud

Common Problem

Answer: For DDoS attacks, Huosanyun provides a variety of security protection solutions, and you can choose the appropriate protection solution according to your actual business.

Answer: Denial of Service (DoS for short) attack, also known as flood attack, is a network attack method whose purpose is to exhaust the network or system resources of the target computer, temporarily interrupt or stop the service, and cause legitimate users to be unable to The act of accessing normal web services. When an attacker uses multiple compromised computers on the network as attack machines to launch a DoS attack on a specific target, it is called a Distributed Denial of Service Attack (DDoS for short). Common types of DDoS attacks are as follows:
network layer attack
The network bandwidth of the victim is congested by the large amount of traffic, which makes the business of the victim unable to respond to customer visits normally. (Common network layer attacks include NTP Flood attacks).
transport layer attack
By occupying the server's connection pool resources, the purpose of denial of service is achieved. (Common transport layer attacks include SYN Flood attack, ACK Flood attack, and ICMP Flood attack.)
session layer attack
By occupying the server's SSL session resources, the purpose of denial of service is achieved. (Common session layer attacks include SSL connection attacks.)
application layer attack
By occupying the application processing resources of the server, the processing performance of the server is greatly consumed, and the purpose of denial of service is achieved. (Common application layer attacks include HTTP Get Flood attacks and HTTP Post Flood attacks.)

Answer: When the business suffers from a large number of DDoS attacks, the DDoS high-defense service can be used first to ensure the stability of the business. On the other hand, it is recommended to report the case to the network monitoring department immediately.
Reporting process
After suffering a DDoS attack, you should report to the local network monitoring department as soon as possible, and provide relevant information according to the requirements of the network monitoring department.
The network monitoring department judges whether it meets the standards for filing a case, and enters the network monitoring process.
Note: For specific filing standards, please consult the local network monitoring department.
After the case is formally filed, Huosanyun will cooperate with the person in charge of the network monitoring department to provide attack evidence.

Answer: Support. DDoS Anti-DDoS Pro can protect any public network server, including but not limited to Huosan Cloud, other clouds, etc.
Note: Domain names accessed in mainland China must undergo ICP filing in accordance with the requirements of the Ministry of Industry and Information Technology. If the domain name is not filed, Anti-DDoS Pro service cannot be provided.

Answer: In the configuration of anti-DDoS high IP website business forwarding rules, it supports the protection of wild domain names.

Answer: You can choose to use domain name access to connect website services to Anti-DDoS Pro through domain name resolution. After the website business is connected to Anti-DDoS Pro, the business will resolve the domain name to the Anti-DDoS Pro IP, and Anti-DDoS Pro will divert all public network traffic to the Anti-DDoS Pro, thereby hiding the source site and preventing the source site (user business) from being subjected to large-traffic DDoS attack.

Answer: Non-website configurations are usually used for APP and PC client services. After non-website services are connected to Anti-DDoS Pro, the service IP is replaced with Anti-DDoS Pro, and Anti-DDoS Pro will divert all public network traffic to Anti-DDoS Pro. , and then hide the source site to prevent the source site (user business) from being attacked by heavy traffic DDoS. You can connect traffic to Anti-DDoS by configuring Anti-DDoS Pro to DNS or configuring Anti-DDoS Pro IP directly to the client.

Get started with the free tier

Contact customer service, as long as there is a business need, you can get an independent server test! Register as a member to provide you with the best cloud practice opportunities

微信

15323421841