Kingsoft Cloud Advanced Defense

Kingsoft Cloud Advanced Defense (KAD) provides advanced defense for its users’ recorded domain names against 1 Tbps DDoS attacks at most. When the users suffer from DDoS traffic floods, they can configure KAD and attract the attack traffic to the advanced defense IP to keep source stations stable and available.
Benefits
Features
Scenarios
Customers

Benefits

Mass Data Cleaning

Multi-line BGP, multi-selections of defense lines, up to 1T access for single node and single operator line.

Rapid Response

KAD performs excellently in device detection and cleaning in seconds with extremely high accuracy.

High Cost-efficiency

Billing by the day flexibly for huge network-flow, pay-per-view for protective capability, a number of selections of selling mode, multi-scenario supported, and protective cost controllable.

Zero Deployment Cost

Users do not need to change network topology or purchase other devices.

Features

Complete DDoS Defense

KAD provides complete 4-7 layers of defense against attacks, covering TCP flood, UDP flood, CC and other common types of attacks.

Attack Data Query

The attack logs and traffic charts help to present attack situations transparently.

Multiple Protocol Support

KAD fully supports HTTP, HTTPS and TCP and partially supports UDP.

Non-Cloud User Access

Non-cloud users can seamlessly access KAD.

Scenarios

The best practice of KAD

Game security solutions

The best practice of KAD

Using Kingsoft Cloud Advanced Defense IP to protect and clean DDoS attacks on the cloud and resolve DDoS attacks from all huge network-flow and CC attacks of application layer, hiding the actual source station IP and protecting the source station’s business at the same time.

Cleaning principle of KAD

Using Kingsoft Cloud Advanced Defense IP to protect and clean DDoS attacks on the cloud and resolve DDoS attacks from all huge network-flow and CC attacks of application layer, hiding the actual source station IP and protecting the source station’s business at the same time.

Game security solutions

One-stop game security protection and safe operation and maintenance experience for all game types, including mobile games, client games, and browser games, supporting the customized dedicated line for back-to-source.

Perfectly solution for CC

Aiming at the particular identification of complicated CC based on the depth of data package, only the flow requested from normal game clients is permitted, which perfectly solves the CC issues of game.