Professional Reliability

Bolstered by over 17 years of defensive expertise, Huawei's anti-DDoS systems, certified by NSS Labs, guarantee professional reliability.

Fully Accurate

A constantly updated database (carrying millions of blacklisted IP addresses) coupled with a 7-layer, smart cleaning mechanism ensures accurate results.

Instantaneous Response

With industry-leading technology and powerful equipment, Anti-DDoS checks each packet and responds to any attack immediately without causing service delays.

Completely Free

Anti-DDoS is free of charge and instantly available upon application. It provides professional defense templates and protection threshold learning capability.

Application Scenarios

  • Website Browsing

  • Gaming

Website Browsing

Website Browsing

Websites are prone to DDoS attacks, which ultimately can cause them to crash. The Anti-DDoS service can withstand multi-layered (layers 4 to 7) attacks, which in turn improves the browsing experience.

Benefits

  • Stable Services

    Defends against 100+ types of transmission and application layer DDoS attacks to keep your website stable.

  • Reliable Links

    Defends against reflection and amplification attacks to ensure link reliability.

  • Completely Free

    Get up to 500 Mbit/s of free protection with just one click.

Related Services

ELB

Gaming

Gaming

Online gaming poses a considerable risk with regards to malware. Anti-DDoS protects against every form of DDoS attack to ensure stable Internet connections.

Benefits

  • Low Latency

    When an attack is detected, proprietary V-ISA reputation technology is utilized to help prioritize online gameplay.

  • Instantaneous Response

    Automates packet detection and policy matching to keep response down to mere seconds.

  • Completely Free

    Get up to 500 Mbit/s of free protection with just one click.

Recommended for Use With

ELB

Functions

Filter Malformed and Probe Packets

Filters malformed packets and defends against scanning and probing attacks based on RFC standards.

  • Malformed Packets

    LAND, Fraggle, Smurf, Winnuke, Ping of Death, Tear Drop, and TCP Error Flag

  • Probe Packets

    Port scanning, address scanning, TRACERT control packet attacks, IP source route option attacks, IP timestamp option attacks, and IP record route option attacks

Defend Against Network Transmission–based Attacks

Effectively defends against attacks such as SYN, SYN-ACK, FIN, RST, UDP, ICMP Flood, and TCP connection exhaustion.

  • TCP/UDP/ICMP Flood Attacks

    SYN/SYN-ACK/ACK Flood, FIN Flood, RST Flood, TCP/UDP Fragment Flood, UDP Flood, and ICMP Flood attacks

  • TCP Connection Exhaustion Attacks

    Zombie hosts are used to establish a large number of TCP connections to exhaust the server.

Prevent Application Layer Threats

Effectively prevents attacks such as HTTP Get, Post Flood, CC, HTTP Slow Header/Post, and HTTPS Flood.

  • Web Application Attacks

    HTTP Get/Post Flood, CC, HTTP Slow Header/Post, SSL DoS/DDoS, RUDY, LOIC, and WordPress attacks

  • DNS/SIP Attacks

    DNS Query Flood, DNS Reply Flood, DNS cache poisoning, and SIP Flood/SIP Methods Flood attacks such as Register Flood, Deregistration Flood, Authentication Flood, and Call Flood

Display Attack Trends and Traffic Reports

Uses a user-friendly platform to show real-time service traffic and attack trends.

  • IP Address Monitoring

    Displays the current defense status and configuration parameters; shows service traffic and various abnormalities over the past 24 hours.

  • Defense Summary

    Provides comprehensive defense summary with detailed important protection metrics. In addition, the Top 10 most frequently attacked servers (along with the corresponding number of intercepted attacks) are listed.

Register Now