Advanced Anti-DDoS

Advanced Anti-DDoS (AAD) is a value-added service that protects gaming, finance, and e-commerce customers against large volumetric DDoS attacks. It diverts attack traffic to high-defense IP addresses with high defense capabilities for scrubbing, thereby keeping your businesses stable and reliable.

A free trial is available for you to see how well AAD keeps systems fully protected.

Product Advantages
  • Great Capability

    AAD has 16+ scrubbing centers globally with Tbit/s-level defense capabilities. Services are always protected while meeting geo-specific requirements.

  • Instantaneous Response

    Real-time monitoring of network conditions and immediate diversion of attack traffic keep a tight lid on security risks so you can run your business without worry.

  • Highly Reliable

    Automatic attack detection and defense policy matching provide real-time protection yielding up to 99.9% of service availability.

  • 24/7 Support

    Award-winning teams provide around-the-clock support to keep your services up and running.

Application Scenarios
  • Website Browsing

  • Gaming

Website Browsing

Customer Requirements

Website access is slow or blocked due to DDoS and CC attacks, resulting in the loss of users and low sales volumes.

Advantages

Application Layer Defense

AAD blocks HTTP traffic that does not comply with specified protocol specifications or fails to pass the DPI engine, and unauthorized HTTP content.

Web Security Defense

AAD protects web and mobile applications, and APIs from common threats such as OWASP Top 10.

Quick Access

Static content is cached to edge nodes. Automatically accessing the nearest cache greatly improves website access speeds.

Related Services

elb

Gaming

Customer Requirements

DDoS attacks affect the gaming experience, causing loss of revenue and disinterest in the game from unforgiving gamers who expect top performance because milliseconds often decide victory and defeat.

Advantages

Deep Packet Inspection

Attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols can be detected in advance by filtering malformed packets and application layer traffic.

Adaptive Filtering

Big data threat analysis, baseline traffic statistics, and exception identification are used to prevent zero-day attacks.

CC Attack Defense

Instantaneous response to attacks and user identity authentication are used to further identify normal from attack traffic for precise defense.

Related Services

elb

Functions

  • Extensive Anti-DDoS Defense

    Provides high-bandwidth and precise traffic scrubbing capabilities to effectively defend against various DDoS attacks.

  • Multiple Protocols

    Adopts industry-vetted technologies to detect and protect protocols such as HTTP, HTTPS, and TCP.

  • Intelligent Protection for Origin Server

    Diversion from the origin server, intelligent acceleration, and zero-day attack defense

Extensive Anti-DDoS Defense

  • Precise traffic protection

    Filters malformed packets and scrubs attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods.

  • WAF/CC attack prevention

    Identifies and blocks SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks to ensure your web-based services remain secure and stable.

Multiple Protocols

  • Web security defense

    Blocks HTTP traffic that does not comply with specified protocol specifications or fails to pass the DPI engine, and unauthorized HTTP content.

  • Deep packet inspection

    Filters malformed packets and application layer traffic to prevent such attacks as SYN floods that exploit vulnerabilities in TCP or IP protocols.

Intelligent Protection for Origin Server

  • Diversion from the origin server

    The domain name that is requested is resolved and returned to the IP address of the high-defense node, preventing attacks on the origin server.

  • Adaptive filtering

    Uses Big Data threat analysis, baseline traffic statistics, and exception identification to prevent zero-day attacks.

  • Quick access

    Supports static content cached to the edge nodes. Automatically accessing the nearest cache greatly improves the website access speeds.

Provides Scalable, On-demand Computing Resources

Learn More