Protection is provided against multiple types of DDoS attacks, including but not limited to SYN Flood, ACK Flood, ICMP Flood, UDP Flood and TCP Flood attacks, and DDoS Attack Protection provides precise defense mechanism such as white list and black list.
After elastic protection is enabled, your businesses can still be protected by JD Cloud when the attack suffered by you exceeds the peak value of purchased package. By using elastic protection function, you will no longer worry about the problem of service interruption due to the attack exceeding the package peak value.
You can develop defensive rules based on the business processing capabilities of the website or the QPS access source IP, to make effective man-machine identification for all requests exceeding the threshold, and directly block the spam traffic.
Effectively defense OWASP TOP 10 attacks such as SQL injection, XSS attack, command/code execution, file include, webshell upload, path traversal and malicious scan. Professional attack-defense team will follow up 0day vulnerability 7*24 hours, analyze vulnerability principle and develop security protection policies for timely protection.
Through study and training of JD's accumulated massive logs, a variety of Web security protection models are output to conduct intelligent analysis of multiple factors of the user's multiple requests, so as to effectively improve detection rate and reduce false alarm rate. Through Information Island and behavior detection and analysis, malicious attack sources are identified to protect the security of origin server.
Support self-service configuration of acceleration service content and back-to-origin configuration, parameter filtering, Http Header setting, etc.
Support verification of the legitimacy of user identity by means of Referer anti-leech, URL authentication, UA IAM, and IP black list so as to guarantee the security of origin server.
Provide full-link HTTPS security acceleration solutions and support certificate upload and management.
Support network layer and application layer security monitoring analysis, provide overall and full-time DDoS and CC attack information and attack event, with attack and defense conditions of site viewed in real time.
Considerations are given to all-round security protection and content stability acceleration. The whole on-line game playing process relies on the content acceleration CDN service to guarantee downloading and performance stability; meanwhile, the game industry is subject to traffic attack interference frequently. Intelligent Edge Security Service combines security and acceleration, improves content loading speed and guarantees smooth operation cross networks and of multiple terminals. Meanwhile, it avoids site faults, player experience degradation, user loss and enterprise loss due to frequent attacks.
Internet Finance is commonly implemented with on-line business systems with high requirements on data content security. With secure and stable online businesses, Internet financial websites are the key points for service selection by users. Financial data are the main objects of malicious creeper attacks, and site performance, website security as well as content security shall be completely taken into account.
Political Security or Staged Society Stability Demand. Rapid and reliable network access is a basic requirement for government websites. During a conference or a special period, the website availability shall be guaranteed to the extent that it is protected against DDoS attacks or CC attacks; moreover, as the count of accesses to some websites is higher during a conference than usual, it is necessary to guarantee that the website is smooth under high concurrency and the access speed is quick.
Considerations are given to Overall Security Protection and Stable Content Acceleration. E-commerce Web sites and websites of various health care institutions are application types subject to frequent attacks. Potential attackers will get users’ actual IP addresses via various methods and initialize DDOS or CC attacks to prevent users from providing service externally.