High-defense CDN_Global defense points (China, Hong Kong, and the United States) jointly defend against attacks

High defense CDN

Yisuyun High-Defense CDN hides the real IP address and implements distributed defense through more than 10 defense nodes around the world. The overall defense exceeds 5000G. Through the intelligent scheduling system, it diverts and cleans the attack traffic, providing security protection for your business to defend against malicious attacks.

Price

Mainland China (basic type)

Defense: 50G, bandwidth: 10M, protection domain names: 5, QPS: 5000, 1999 yuan a month.

Mainland China (standard type)

Defense: 100G, bandwidth: 30M, protection domain names: 10, QPS: 10000, 5999 yuan a month.

Hong Kong, China (basic type)

Defense: 100G, bandwidth: 2M, protection domain names: 10, QPS: 5000, 3500 yuan a month.

Hong Kong, China (standard type)

Defense: 100G, bandwidth: 5M, protection domain names: 10, QPS: 10000, 3750 yuan a month.

Applicable scene

  • Network security attack protection for finance, games, media, government, etc.
  • Real-time battle games, online finance, e-commerce and other businesses that require high real-time user experience
  • There are DDoS attack protection scenarios with a large number of ports, domain names, and IPs in the business.

Distributed defense: 5000G+

Defense Type: 9+

Network line: 9+

Intelligent protection: AI

Features

High reliability and high availability

Fully automatic detection and attack strategy matching, real-time protection, and combination on the basis of a single high-defense IP can achieve a higher degree of interception of DDoS traffic, and the cleaning service availability is 99.99%.

Website performance optimization

Static resource compression: For websites with a lot of static resources, especially websites with small source bandwidth, static resources can be compressed into 5 to 6 times of the original file size.

DDoS defense

Precise cleaning based on advanced feature recognition algorithms achieves the highest TGbps level defense, helping you resist various DDoS high-traffic attacks such as Syn Flood and ICMP Flood. Support TCP/UDP/HTTP/HTTPS.

CC attack protection

Accurately identify malicious visitors through various means such as protection pattern recognition and identity recognition, and use re-authentication, verification codes, access control and other means to accurately attack, helping you resist various attacks such as http get. You can adjust the strictness of the system policy by yourself.

Source resource hiding

After using Yisuyun High-Defense IP, you can interpret the domain name to Yisuyun High-Defense IP, and Yisuyun High-Defense IP will forward your real IP address, thus achieving the goal of hiding the real IP. After using the source station hiding function, attackers will not be able to directly attack your website server.

Full attack log

You can query TG-level full request log data without paying. Summarize and analyze all requests separately from region, URI, number of visits, and HTTP protocol elements. To make malicious attacks easier to detect and deal with, all logs include intelligent protection policy functions.

Real-time attack alerts

Supports DDoS attack traffic alerts, SSL certificate expiration alerts, CC attack alerts, QPS surge alerts, and high-defense IP ban alerts. The above alerts are sent via text message by default, allowing users to set their own sending frequency.

Anti-port scanning

TCP/UDP protocols are often subject to malicious port scanning. Once the ports and services in use are analyzed, they are more susceptible to targeted penetration and brute force cracking. High-defense IP can block such malicious scans.

Core functions

core architecture

Yisu Cloud DDoS High Defense IP is a paid value-added service launched when Internet servers (including non-Yisu Cloud hosts) suffer service unavailability after suffering large-traffic DDoS attacks. DDoS defense capability, total defense exceeds 5000G, and is deployed in different regions around the world to protect your business globally. Malformed packet filtering, transport layer DDos attack protection, and web application DDos attack protection.

Precise access control

Detect and intercept based on various elements of the HTTP protocol (such as user-agent, cookie, content-type, token), especially to intercept higher-end crawlers and automated operations such as forged tokens, cookies, etc., by cooperating with the actual business of the website Write appropriate rules to intercept malicious "wool harvesting" behavior.

frequency control

Based on the access rate, it identifies and intercepts clients that maliciously access websites with high frequency; frequency control protection automatically takes effect after it is turned on, and the normal protection mode is used by default to help websites defend against general CC attacks. Frequency control protection provides multiple protection modes for you to adjust and use in different scenarios. You can also customize frequency control rules to restrict a single source IP from accessing a certain page abnormally frequently in a short period of time.

Static cache acceleration

The savior of low-configuration cloud servers, it intelligently determines the correct request and easily caches static resources, images, etc. of the source server. It can also cache GET and POST interface requests, and even supports updating the cache of an already cached URI. You can almost use it as a CDN cache server. If your website's source server goes down one day, user access will not be affected as long as it is configured correctly.

Black and white list

Regional banning refers to banning all access requests from source IPs in a certain region (domestic provinces and municipalities, Hong Kong, Macao, Taiwan, or other countries), thereby blocking attacks in the region. You can select multiple regions at the same time. Currently, this function only targets CC attacks, and DDoS attacks have not yet been fully implemented.

Regional IP ban

Regional banning refers to banning all access requests from source IPs in a certain region (domestic provinces and municipalities, Hong Kong, Macao, Taiwan, or other countries), thereby blocking attacks in the region. You can select multiple regions at the same time. Currently, this function only targets CC attacks, and DDoS attacks have not yet been fully implemented.

Application scenario

gaming industry

Currently, the gaming industry is one of the hottest industries on the Internet, with many gamers. Game service providers use high-defense servers, which not only effectively ensure the safe operation of games, but also provide users with a safe gaming environment. After all, game instability will cause a large loss of users.

Live broadcast industry

In addition to the gaming industry, the most popular field now is undoubtedly the live broadcast field. However, with the popularity of live broadcast platforms, network attacks have naturally targeted the live broadcast industry. Once the server suffers a network attack, it will cause the live broadcast to be unable to run normally, resulting in the loss of users. This is very difficult for the highly competitive live broadcast industry. , the loss is immeasurable.

E-commerce industry

The e-commerce industry is also one of the industries frequently visited by cyberattacks. Attackers will steal the data and funds in the server, posing a serious threat to the user's data security and funds. Therefore, the e-commerce industry also recommends choosing high-defense servers.

Financial sector

Entrepreneurs in the financial industry attach great importance to the security of data information. Once data information is leaked, the losses will be immeasurable. Therefore, the security of data information and providing users with a safe network environment are prerequisites for Internet companies to conduct business and are also the cornerstone of corporate development.

High-defense CDN_Global defense points (China, Hong Kong, China, the United States) jointly defend against attacks

Rate the article
Show verification code