Kingsoft Cloud Advanced Defense (KAD) provides advanced defense for its users’ recorded domain names against 1 Tbps DDoS attacks at most. When the users suffer from DDoS traffic floods, they can configure KAD and attract the attack traffic to the advanced defense IP to keep source stations stable and available.
Multi-line BGP, multi-selections of defense lines, up to 1T access for single node and single operator line.
Rapid Response
KAD performs excellently in device detection and cleaning in seconds with extremely high accuracy.
High Cost-efficiency
Billing by the day flexibly for huge network-flow, pay-per-view for protective capability, a number of selections of selling mode, multi-scenario supported, and protective cost controllable.
Zero Deployment Cost
Users do not need to change network topology or purchase other devices.
Features
Complete DDoS Defense
KAD provides complete 4-7 layers of defense against attacks, covering TCP flood, UDP flood, CC and other common types of attacks.
Attack Data Query
The attack logs and traffic charts help to present attack situations transparently.
Multiple Protocol Support
KAD fully supports HTTP, HTTPS and TCP and partially supports UDP.
Non-Cloud User Access
Non-cloud users can seamlessly access KAD.
Scenarios
The best practice of KAD
Game security solutions
The best practice of KAD
Using Kingsoft Cloud Advanced Defense IP to protect and clean DDoS attacks on the cloud and resolve DDoS attacks from all huge network-flow and CC attacks of application layer, hiding the actual source station IP and protecting the source station’s business at the same time.
Cleaning principle of KAD
Using Kingsoft Cloud Advanced Defense IP to protect and clean DDoS attacks on the cloud and resolve DDoS attacks from all huge network-flow and CC attacks of application layer, hiding the actual source station IP and protecting the source station’s business at the same time.
Game security solutions
One-stop game security protection and safe operation and maintenance experience for all game types, including mobile games, client games, and browser games, supporting the customized dedicated line for back-to-source.
Perfectly solution for CC
Aiming at the particular identification of complicated CC based on the depth of data package, only the flow requested from normal game clients is permitted, which perfectly solves the CC issues of game.