Joke Collection Website - Blessing messages - What are the protection products currently in use and which product can protect against DDOS?

What are the protection products currently in use and which product can protect against DDOS?

The main services of Yundi products?

Telecom Yundi·DDoS attack protection (referred to as "Telecom Yundi·Anti-D"), Telecom Yundi·Domain name security protection (referred to as "Telecom Yundi·Domain name worry-free"), Telecom Yundi· Anti-phishing website disposal (referred to as: "Telecom Yundi·Anti-phishing") and Telecom Yundi·Website Security Expert (referred to as: "Telecom Yundi·Website Security Expert")

DDOS protection methods?

1. DDoS network attack protection: When faced with a large number of SYNFlood, UDPFlood, DNSFlood, and ICMPFlood attacks, the source of the attack can be quickly blocked to ensure normal business operation.

2. Disaster recovery for domain name resolution dysfunction. : When the root domain and top-level domain servers fail and cannot provide normal services, or even when all external authorization servers fail, a company's next-generation firewall DNS proxy system can still serve as a resolution island to provide normal domain name resolution services.

3. DNS security policy linkage: Track and monitor resolution requests for key domains/domain names. When an abnormality occurs, relevant security linkage measures are initiated and only normal domain names are responded to.

4. DNS amplification attack protection: When a certain IP traffic suddenly increases, IP analysis and security linkage measures are automatically initiated, the rate of the IP is limited, and the response results are pruned, effectively preventing the DNS server from becoming the source of amplification attacks.

5. Multi-line traffic scheduling and disaster recovery: Different exit policies can be configured for customers with multiple line exits.

6. Weak credential awareness: When legitimate users log in to various applications through weak passwords. When managing the system, the security administrator will be intelligently sensed and notified of the existence of weak password security risks, thereby improving the account security level.

7. Vulnerability attack protection: When an attacker performs brute force password enumeration on corporate information assets. Or system vulnerability attacks can be quickly detected and effective defenses can be formed.

8. Botnet detection: When employees within the organization receive malware through instant messaging tools or emails, Malware can be quickly detected during communication with the outside world, thereby effectively protecting the organization's internal information from being leaked.

9. APT targeted attack detection: A company's next-generation firewall can pass through a variety of methods. The traffic identification algorithm effectively detects APT directed attacks, ZeroDay attacks and malware during transmission, and blocks APT attacks thousands of miles away.

Router ddos ??defense settings?

1 , Source IP address filtering

Filtering the source IP address at all network access or aggregation nodes of the ISP can effectively reduce or eliminate source IP address spoofing, making SMURF, TCP-SYNflood and other DDoS The attack cannot be implemented.

2. Traffic restriction

Control certain types of traffic, such as ICMP, UDP, and TCP-SYN traffic, and limit their size to a reasonable size. The level can reduce the impact of denial of DDoS attacks on the bearer network and target network.

3. ACL filtering

Filter the traffic of the worm attack port and the control port of the DDoS tool without affecting the business.

4. TCP interception

For TCP-SYNflood attacks, the user side can consider enabling the TCP interception function of the gateway device to resist. Since turning on the TCP interception function may have a certain impact on router performance, comprehensive considerations should be taken when using this function.

What are the cloud computing virtual products?

Cloud computing virtualization products include cloud servers, virtual hosts, cloud storage, super computing clusters, container services, CDN, databases, SMS services, network acceleration, load balancing, DDoS defense, Web application firewalls, Cloud bastion host, SSL certificate, Cloud Shield, big data, artificial intelligence, enterprise mailbox

The first is the most basic cloud computing product, that is, the public cloud vendor that provides cloud computing resources. The domestic representatives are Alibaba Cloud, Huawei Cloud, Tencent Cloud, etc., including AWS, GCP, Azure, etc. abroad,