Anti-DDoS
Anti-DDoS
Built on the massive heterogeneous resource network and micro-isolation technique, we have built a powerful distributed DDoS traffic cleaning capability to provide comprehensive, accurate, and low latency traffic cleaning for customers' applications in the fields of gaming, e-commerce, finance, etc., and guarantee the high stability and high availability of the network and applications.

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages

Product Feature

Application Scenarios

Customer Case

Product Advantages
Large: Massive Traffic Cleaning Resource Pool

Large: Massive Traffic Cleaning Resource Pool

Multiple distributed traffic cleaning centers, integrated with 4.5Tbps+ single node DDoS protection capabilities and 90Tbps+ global bandwidth reservation, can defend against traffic attacks at various scales.
Comprehensive: Full Protocol Traffic Cleaning

Comprehensive: Full Protocol Traffic Cleaning

It fully supports HTTP, HTTPS, TCP, UDP, and other protocols to effectively defend against ICMP Flood, SYN Flood, SYN-ACK Flood, ACK Flood, FIN-RST Flood, TCP fragmentation attack, TCP port exhaustion attack, UDP Flood, UDP fragmentation attack and other types of attacks to protect business continuity.
Fine: Refined Tenant Isolation And Zero-Trust Connectivity

Fine: Refined Tenant Isolation And Zero-Trust Connectivity

Based on the zero-trust concept and eBPF/XDP technology, multi-tenant isolation is realized at the kernel layer to establish separate network security space and “one password for a single device” security tunnel connection between massive users and distributed edge security nodes, automatically learn and identify device fingerprint characteristics and visitor reputation, and effectively defend against various variants of DDoS attacks to protect tenant business continuity from threats of other tenants.
Accurate: Behavior Analysis For Accurate CC Defense

Accurate: Behavior Analysis For Accurate CC Defense

Using big data analysis, behavior modeling, and isolated forest algorithm technology to effectively identify normal user access behavior from resource-depletion attacks in business and block the attacks in real-time to guarantee high availability of business.
Fast: Low Latency And Fast Response

Fast: Low Latency And Fast Response

Edge-based traffic cleaning can realize proximity access, millisecond-level cleaning, and isolation and quickly respond to normal user requests to avoid business access latency.
Saving: Cost-Effective Full Protection

Saving: Cost-Effective Full Protection

The attack traffic is cleaned thoroughly to ensure business continuity and free customers from worries.
Product Feature
undefined undefined

Hiding The Origin

Unlike conventional single node cleaning, the provision of public services through the distributed secure edge nodes can hide the origin and avoid its exposure, significantly increasing the cost of attacks.
undefined undefined

Intelligent Protection

Combining an AI engine and global threat intelligence library, using user behavior analysis, feature learning, protection confrontation, and other techniques to achieve intelligent protection.
undefined undefined

Accurate Access Control

Provide UA, Cookie, URL, IP, body, and other multi-dimensional accurate access control and proper protection; support botnet threat intelligence to intercept botnet IP directly.
undefined undefined

Attack Traceability

When an attack event occurs, the log based on the attack traffic is supported as an essential basis and evidence for attack traceability.
undefined undefined

“One Password Only For A Single Device” Confrontation

“One password only for a single device” tunnel connection between massive users and distributed secure edge nodes can be established to automatically identify the legality of the connection and effectively defend against variant attacks.
Application Scenarios

DDoS Protection

DDoS Protection

Through SaaS-based access, Baishan DDoS protection effectively defends against all kinds of traffic-based attacks and resource depletion attacks, hides and protects the origin from attacks, and guarantees business security and availability.

undefined
Customer Case