Information Center

Unique "Iron Cloth Shirt" against DDoS attacks


According to Kaspersky's Q2 DDoS attack report in 2019, the total number of attacks increased by 18 percentage points compared with Q2 in 2018. In this quarter, China was also the region with the largest number of DDoS attacks (63.80%), and the longest attack lasted 509 hours, setting a new historical record.

DDoS attackers have shifted their focus from the network and transport layer to the application layer. The scale of attacks has also grown exponentially. DDoS protection has become increasingly difficult in recent years.

Most enterprises lack the resources to extend their security plans to provide adequate DDoS protection.

How to defend against DDoS attacks?

Haoyou Cloud provides anti DDoS attack defense systems for some enterprises around the world to protect them from increasing threats and provide multi-level defense against complex and large-scale DDoS attacks.

Haoyou cloud defense product Ant-DDoS system uses self-developed anti denial of service attack algorithm to block attack traffic in real time and ensure normal business access.

The protection strategy based on IP, ICMP, TCP, UDP, HTTP and many other protocol types can monitor various types of defense attacks.

Accurate identification:

We independently developed a variety of anti denial of service attack algorithms, and used different algorithms (such as source address verification, TCP retransmission verification, hop learning and detection, fingerprint identification verification, protocol stack behavior pattern analysis, etc.) to identify different types of DDoS attacks, which can accurately distinguish malicious DDoS attack messages. The product has high recognition rate and high accuracy, which can ensure that normal customers' access will not be affected under the condition of effectively intercepting various attacks.

Defend against multiple attack types:

It can effectively defend against SYN Flood, ACK Flood, SYNACK Flood, FIN/RST Flood, UDP Flood, ICMP Flood, Smurf, Land based, Fragment Flood and other common attacks.

It can effectively defend against HTTP Get Flood attack, TCP connection exhaustion attack, TCP empty connection attack and other attacks against web services. It also supports setting custom protocol types to protect specific application layer protocols, such as online games, voice, instant messaging related protocols, etc.

It can effectively defend against DDoS attacks launched by various anonymous attack tools and bots.

Adaptive rate:

By monitoring and controlling the request rate for applications, applications can be automatically protected from application layer DDoS and other huge attacks.

Flexible deployment:

The Anti DDoS system provides a serial deployment mode, which can transparently "cascade" the serial version of AD-100 firewall at the network entrance to detect, analyze and block DDoS attacks.

In addition to serial deployment, the Anti DDoS system also provides a bypass deployment mode, which imports traffic through BGP or policy routing. After filtering DDoS attacks, the protection equipment injects "clean" traffic back into the network. Reinjection methods can be strategic routing, two-layer reinjection and three-layer reinjection.

T-level defense capability:

The single Anti DDoS system has 80G defense capability and supports the deployment of up to 32 clusters, that is, the overall cluster can support up to 2T of cleaning defense capability, which can enable the entire system to withstand massive DDoS attacks.

Specific services:

The intelligent defense based on IP reputation and IP behavior analysis achieves perfect defense effect against CC class proxy IP attacks, botnet attacks, etc. Built in special protection plug-ins for various servers, such as games, DNS servers, mail servers, web servers, etc., support the configuration of different parameters for protection by analyzing the service characteristics of the protected host.

Log management:

Display the detailed log time, record the status operation record of the device during this time, support the classification display of log events, statistics of host traffic, connections, events and other analysis reports, and support the output display of a single IP host.


It supports the black and white list function of domain names, supports limiting the number of connections between a single IP and the server, supports built-in predefined rules, supports custom functions such as general rule matching.

Haoyou Cloud DDoS protection products (Anti DDoS) have comprehensive, efficient and professional DDoS protection capabilities. Through sufficient and high-quality DDoS protection resources, users can ensure the stable and safe operation of their business.

The strong self-development team has the ability to rapidly iterate the defense system for emerging attacks, effectively improving the defense service level. The protection scenario covers games, Internet, video, finance, government and other industries.