Great Capability

AAD has 9+ scrubbing centers with Tbit/s-level defense capabilities. With scrubbing centers distributed around the world, your layout is always protected while meeting geo-specific requirements.

Instantaneous Response

Real-time monitoring of network conditions and immediate diversion of attack traffic keeps a tight lid on security risks so you can run your business without worry.

High Reliability

Automatic attack detection and defense policy matching provide real-time protection to yield up to 99.9% of service availability.

24/7 Support

Award-winning teams provide around-the-clock support to keep your services up and running.

Application Scenarios

  • Website Protection

  • Gaming Protection

Website Protection

Situation Before AAD Deployment

Website access is slow or blocked due to DDoS and CC attacks, resulting in the loss of users and low sales volumes.

Advantages

  • Application-layer Defense

    AAD blocks HTTP traffic that does not comply with specified protocol specifications, unauthorized HTTP content, and HTTP traffic that fails to pass the DPI engine.

  • Web Security Defense

    AAD protects web, mobile applications, and API interfaces from common threats such as OWASP Top 10.

  • Quick Access

    Static content is cached to cloud nodes. Automatically accesses the nearest cache greatly improve the website access speeds.

Related Services

ELB

Gaming Protection

Situation Before AAD Deployment

DDoS attacks affect the gaming experience, causing loss of revenue and disinterest in the game from unforgiving gamers who expect top performance because milliseconds often decide victory and defeat.

Advantages

  • Deep Packet Inspection

    Attacks such as SYN floods that exploit vulnerabilities in TCP or IP protocols can be detected in advance by filtering malformed packets and application-layer traffic.

  • Adaptive Filtering

    Big Data threat analysis, baseline traffic statistics, and exception identification are used to prevent zero-day attacks.

  • CC Attack Defense

    Instantaneous response to attacks and user identity authentication are used to further tell normal from attack traffic for precise defense.

Related Services

ELB

Functions

All-round Anti-DDoS Defense

Provides high-bandwidth, precise traffic cleansing capabilities to effectively defend against various DDoS attacks.

  • Precise Traffic Protection

    Filters malformed packets and cleans attack traffic, such as SYN floods, ACK floods, UDP floods, ICMP floods, and RST floods.

  • WAF/CC Attack Prevention

    Identifies and blocks SQL injection, XSS attacks, CC attacks, malicious crawler scanning, and CSRF attacks to help ensure your web-based services remain secure and stable.

Multiple Protocols

Adopts industry-leading detection and protection technologies to detect and protect protocols such as HTTP, HTTPS, and TCP.

  • Web Security Defense

    Blocks HTTP traffic that does not comply with specified protocol specifications, unauthorized HTTP content, and HTTP traffic that fails to pass the DPI engine.

  • Deep Packet Inspection

    Filters malformed packets and application-layer traffic to prevent such attacks as SYN floods that exploit vulnerabilities in TCP or IP protocols.

Intelligent Protection for Original Server

Diverts from the original server, and provides intelligent acceleration, and zero-day attack defense capabilities.

  • Diversion from Original Server

    The domain name that is requested is resolved and returned to the IP address of the high-defense node, preventing attacks on the original server.

  • Quick Access

    Supports static content cached to the cloud nodes. Automatically accesses the nearest cache greatly improve the website access speeds.

  • Adaptive Filtering

    Uses Big Data threat analysis, baseline traffic statistics, and exception identification to prevent zero-day attacks.