Anti-DDoS is a traffic scrubbing service that protects resources such as Elastic Cloud Server (ECS) and Elastic Load Balance (ELB) instances from network and application layer distributed denial-of-service (DDoS) attacks. It notifies users of detected attacks instantly, ensures bandwidth availability as well as the stable and reliable running of services.

Free of charge

, providing up to 500 Mbit/s of protection

Learn more
Product Advantages
  • Highly Reliable

    Bolstered by over 17 years of professional expertise and certified by NSS Labs, Huawei's Anti-DDoS systems guarantee reliability.

  • Fully Accurate

    A database that is constantly updated with the latest feature library (carrying millions of blacklisted IP addresses) coupled with a 7-layer, smart scrubbing mechanism ensures accurate results.

  • Instantaneous Response

    With industry-vetted technology and powerful equipment, Anti-DDoS checks each packet and responds to any attack immediately without causing service delays.

  • Completely Free

    Anti-DDoS is free of charge and instantly available upon application. It provides professional defense templates and capability of self-learning to auto-adjust threshold.

Application Scenarios
  • Website Browsing

  • Gaming

Website Browsing

Website Browsing

Websites are prone to DDoS attacks that can ultimately cause them to crash. The Anti-DDoS service can withstand multi-layered (layers 4 to 7) attacks, therefore improving the browsing experience.


Stable Services

Defends against 100+ types of transmission and application layer DDoS attacks to keep your website stable.

Reliable Links

Defends against reflection and amplification attacks to ensure link reliability.

Completely Free

Provides up to 500 Mbit/s of free protection with just one click.

Related Services




Online gaming poses a considerable risk due to malware. Anti-DDoS protects against every form of DDoS attack to ensure stable Internet connections.


Low Latency

When an attack is detected, the proprietary V-ISA reputation system is utilized to help prioritize online gaming services.

Instantaneous Response

Automates packet detection and policy matching to keep response time down to mere seconds.

Completely Free

Provides up to 500 Mbit/s of free protection with just one click.

Related Services



  • Malformed and Probe Packet Filtering

    Filters malformed packets and defends against scanning and probing attacks based on RFC standards.

  • Defense Against Network and Transport Layer Attacks

    Effectively defends against attacks such as SYN floods, SYN-ACK floods, FIN floods, RST floods, UDP floods, ICMP floods, and TCP connection exhaustion.

Malformed and Probe Packet Filtering

  • Malformed packets

    LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop, and TCP Error Flag

  • Probe packets

    Port scanning, address scanning, tracert packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks

Defense Against Network and Transport Layer Attacks

  • TCP/UDP/ICMP flood attacks

    SYN/SYN-ACK/ACK floods, FIN floods, RST floods, TCP/UDP fragmentation floods, UDP floods, and ICMP floods

  • TCP connection exhaustion attacks

    Zombie hosts are used to establish a large number of TCP connections to exhaust the server.

  • Application Layer Threat Prevention

    Effectively prevents attacks such as HTTP GET or POST floods, CC attacks, HTTP Slow Header or POST, and HTTPS floods.

  • Attack Trend and Traffic Report Display

    Applies a user-friendly platform to show real-time service traffic and attack trends.

Application Layer Threat Prevention

  • Web application attacks

    HTTP GET or POST floods, CC attacks, HTTP Slow Header or POST floods, SSL DoS or DDoS, RUDY, LOIC, and WordPress attacks

  • DNS/SIP attacks

    DNS Query floods, DNS Reply floods, DNS cache poisoning, and SIP floods/SIP Methods floods attacks such as Register floods, Deregistration floods, Authentication floods, and Call floods

Attack Trend and Traffic Report Display

  • IP address monitoring

    Displays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.

  • Defense summary

    Provides comprehensive defense summary with detailed and important protection metrics. In addition, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.

Usage Guides

Provides Scalable, On-demand Computing Resources

Learn More