Welcome Customer !

Membership

Help

Hangzhou Dipu Technology Co., Ltd
Custom manufacturer

Main Products:

ybzhan>Products

Hangzhou Dipu Technology Co., Ltd

  • E-mail

  • Phone

  • Address

    6th Floor, Zhongcai Building, No. 68 Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Contact Now

Abnormal flow cleaning system

NegotiableUpdate on 12/13
Model
Nature of the Manufacturer
Producers
Product Category
Place of Origin
Overview
DDoS attacks on abnormal traffic cleaning systems are one of the most favored attack methods by hackers. The common types of DDoS attacks are traffic based DDoS attacks and application based DDoS attacks, which have the characteristics of low initiation cost, low difficulty, difficult detection of attack behavior, and large impact range. Dipu Technology's abnormal traffic cleaning system is a professional DDoS attack protection equipment, including abnormal traffic detection Probe3000, abnormal traffic cleaning Guard3000, and abnormal traffic cleaning business management platform. It can timely detect various DDoS attacks in the network and achieve fast filtering of attack traffic, and can provide a maximum T-level anti DDoS capability. In addition, Dipu Technology's abnormal traffic cleaning system can also provide users with security visualization services, helping them intuitively understand the current network security situation and timely eliminate security risks. more
Product Details
PRODUCT FEATURES Product characteristics more
Telecom grade products Based on a self-developed high-performance hardware architecture platform, the highest detection performance of a single device can reach 100W flows/s, and the highest protection performance can reach 2.56Tbps, achieving second level response and quickly blocking abnormal traffic.
Operational level management platform Operators can use self-service management platforms to provide security protection value-added services for customers who have anti DDoS attack needs (such as internet cafes, hotels, governments, shopping malls, etc.). Tenants' proprietary accounts are used to log in to the DDoS traffic cleaning self-service system. After logging in to the system, tenants can perform attack traffic queries, traffic cleaning start/stop, view cleaning reports, view cleaning records, bill queries, and other functions based on their own network conditions.
Comprehensive protection against various types of DDOS A unique detection engine that can deeply detect and defend against traffic type DDoS and application type DDoS, effectively preventing the current mainstream DDoS attacks. Attackers, in pursuit of attack performance, send messages with similar headers and payloads. Fingerprint protection can protect against the vast majority of popular attacks in the network, and can also adjust feature strategies to protect against new types of attacks that appear in the network.
Bidirectional protection near source cleaning Conventional DDOS attack traffic cleaning is aimed at fixed protection targets, cleaning abnormal traffic in the incoming direction. For DDOS attack traffic in the outbound direction, there is uncertainty in the attack target. Near source cleaning function can be used to enable global cleaning strategy and not protect based on specified IP addresses. By combining the two, bidirectional protection against DDOS attack traffic can be achieved.
Abnormal traffic tracing and traceability In addition to detecting and cleaning DDoS attacks, users also need to conduct in-depth analysis of attack packets. The Dipu Technology Abnormal Traffic Cleaning System integrates a set of tools for packet capture traceability and automatic attack analysis, supporting the capture and analysis of packets before, after, and discarded during cleaning; For packet capture files, it is possible to trace the source IP of the attack and extract attack characteristics from the attack packet, making it easier for administrators to add security policies for targeted protection.
Flexible deployment of complex networks Supports rich network features and can be deployed in complex network environments such as BGP and MPLS VPN. In bypass deployment mode, BGP technology is supported for traffic traction, and traffic injection technology can use policy routing, VLAN, GRE, MPLS and other technologies.
Traffic model self-learning An automatic learning model can be established based on message information and common application statistical information, providing recommended detection and protection thresholds to effectively guide users. Users can choose appropriate templates to use according to their own network business conditions and automatically update them based on the latest traffic information.
<>
PRODUCT SPECIFICATION Product specifications more
PRODUCT FUNCTION Functional Value
Flexible deployment Support bypass deployment and online deployment modes
Routing protocol Support routing protocols such as RIP, OSPF, ISIS, BGP, MPLS, etc
Network characteristics Support BGP drainage, dynamic and static traction methods
Support policy routing MPLS VPN、GRE VPN、 Secondary transparent transmission mode and other injection methods
basic protection Support for dual stack based on IPv4/v6 SYN/ACK Flood、ICMP Flood、UDP Flood、DNS Query Flood、Http Flood、Https Flood、CC、Connections Flood Protection against common DDoS attack methods
Abnormal protection Support the prevention of malformed packet attacks and support the prevention of malformed packet attacks targeting protocol vulnerabilities, such as Land、Smurf、Fraggle、Tear Drop、Winnuke
Attack tracing Support packet capture and traceability function, and analyze packets before, after, and discarded during cleaning; For packet capture files, attack source IP tracing can be performed, and the attack characteristics in the attack packet can be extracted and sent to the cleaning device for filtering
Log Report Support independent log servers, with automatic scheduled backup of logs; Built in with hundreds of reports, it can graphically query, audit, summarize, and retrieve various network behavior logs of internal network users, making it convenient for managers to understand and control the network
system monitor Support device performance monitoring, which can monitor interface traffic information, CPU and memory utilization, and online status monitoring
Specialized software and hardware platform** A dedicated hardware platform using Feiteng CPU and Shengke exchange chip, with software platform authorized to use Kirin kernel

**This feature is only supported on specific models

Similar Product Recommend