Disclaimer
Features

Distributed DDoS Protection
From thousands of PoPs worldwide, high-quality nodes are chosen to deploy high-performance, self-developed DDoS protection modules. These modules use advanced feature recognition algorithms for precise mitigation, effectively countering various DDoS attacks such as SYN Flood and TCP Flood.

Adaptive CC Protection

Smart Web Application Firewall
Utilizing an extensive database of web attack samples and a proprietary AI Engine, end-user access patterns are meticulously analyzed to defend against a range of web attacks, including SQL injection, XSS attacks, and zero-day exploits, thereby safeguarding our customers’ origin sites.

Advanced Access Control
Beyond basic IP, referer, and UA blacklists and whitelists, advanced access control rules allow specification of fields like client IP, URI, Referer, User-Agent, and Params. These rules use various matching methods to enable precise access control.

BOT Behavior Analysis

Attack Statistics and Monitoring
Scenarios
As end-user requests reach the Secure Content Delivery Network, edge Points of Presence (PoPs) swiftly detect and counter a variety of cyber-attacks. This includes deploying distributed PoPs to mitigate Distributed Denial of Service (DDoS) attacks, and utilizing an advanced AI engine to detect and adapt to Web, BOT, and CC attacks, thereby enhancing interception strategies. This proactive approach safeguards customer-origin sites from malicious requests, ensuring uninterrupted and secure business access. Additionally, the network offers both dynamic and static acceleration services to optimize performance.
