All Products
Search
Document Center

Anti-DDoS:Functions and features

Last Updated:May 15, 2024

Anti-DDoS Proxy

Module

Feature

Description

References

Security Overview

Security overview

The Security Overview page displays trends of service and attack traffic, alert events, connection trends, and service traffic distribution by location.

Security Overview

Provisioning

Website configuration

Anti-DDoS Proxy protects your website only after you add the website to Anti-DDoS Proxy and complete the forwarding settings.

Add one or more websites

Port configuration

To use Anti-DDoS Proxy to protect your non-website services, such as client-based applications, you must create port forwarding rules. Then, Anti-DDoS Proxy scrubs traffic that is destined for your services and forwards only service traffic to your origin server based on the port forwarding rules.

Configure port forwarding rules

Sec-Traffic Manager

You can use Sec-Traffic Manager to configure interaction rules between Anti-DDoS Proxy and other Alibaba Cloud services. The rules take effect only in specific scenarios. This feature ensures service continuity and provides protection against DDoS attacks. Sec-Traffic Manager provides features such as cloud service interaction, tiered protection, Alibaba Cloud CDN (CDN) interaction, Dynamic Content Delivery Network (DCDN) interaction, network acceleration, and secure acceleration.

Overview of Sec-Traffic Manager

Assets

Instance management

You can change the burstable protection bandwidth and configure the burstable clean bandwidth and the burstable queries per second (QPS) of instances. You can also upgrade and renew instances.

Manage instances

Anti-DDoS plans

Anti-DDoS Proxy (Chinese Mainland) provides free Anti-DDoS plans to users who meet specific requirements. The free plans can be used to offset the fees that are generated for burstable protection.

Anti-DDoS plans

Investigation

Attack analysis

After you add your service to your Anti-DDoS Proxy instance, you can view the events and details of attacks that are detected on the instance, to obtain information such as the source IP addresses of attacks, distribution of attack types, and distribution of source locations. This helps ensure a transparent protection process and improve user experience of protection analysis. You can also specify custom configurations.

View information on the Attack Analysis page

Log analysis

Anti-DDoS Proxy is integrated with Simple Log Service to collect and analyze full logs of website access. Log analysis is a value-added feature. You must enable this feature before you can use it. After you enable the log analysis feature, Simple Log Service collects the access logs of the website that is protected by Anti-DDoS Proxy in real time. Then, you can query and analyze the logs, and view the log reports.

Log analysis overview

System logs

You can query the bills for the burstable clean bandwidth and burstable QPS of an Anti-DDoS Proxy instance within 90 days. You can also query alerts on exceeded upper limits and destination rate limit events within 90 days.

Query system logs

Operation logs

You can view the logs of important operations on an Anti-DDoS Proxy instance within 180 days.

Query operation logs

CloudMonitor alerts

Anti-DDoS Proxy is integrated with the alert monitoring feature of CloudMonitor. You can configure alert rules and real-time dashboards in the CloudMonitor console. After you configure an alert rule, CloudMonitor reports an alert when the rule is triggered. This way, you can handle exceptions and recover your business at the earliest opportunity. You can also view the monitoring details in real-time dashboards and troubleshoot exceptions.

Use the alert monitoring feature of CloudMonitor

Advanced mitigation logs

If advanced mitigation sessions are provided free of charge for your instance, or if you purchased global advanced mitigation sessions, you can view the usage of the sessions on the Adv. Mitigation Logs page.

Query advanced mitigation logs

Mitigation Settings

Protection for infrastructure

You can configure the following features to improve DDoS mitigation capabilities at the instance level: blacklist and whitelist (IP address-based), location blacklist, blackhole filtering deactivation, near-origin traffic diversion, and UDP reflection attack mitigation.

Protection for infrastructure

Protection for website services

You can configure the following features to improve mitigation capabilities for website services: intelligent protection, anti-DDoS global mitigation policy, blacklist/whitelist (domain names), location blacklist (domain names), and HTTP flood protection.

Protection for website services

Protection for non-website services

You can configure the intelligent protection feature and anti-DDoS mitigation policies to improve DDoS mitigation capabilities. The policies include rate limit for source.

Protection for non-website services

Scenario-specific policies

Anti-DDoS Proxy allows you to create custom mitigation policies. A custom mitigation policy allows you to apply a scenario-specific template for high-traffic scenarios, such as new service launches and Double 11.

Create custom mitigation policies for specific scenarios

Anti-DDoS Lab

Website acceleration

Anti-DDoS Proxy provides scrubbing centers that are integrated with web caching techniques to protect your website services against DDoS attacks and reduce page load time.

Anti-DDoS Lab

Anti-DDoS Origin

Module

Feature

Description

References

Business Monitoring

Business monitoring

The Business Monitoring page displays the protection data of the Anti-DDoS Origin instance of a paid edition to help you understand the security posture of your service. The protection data includes the traffic trends of protected assets and the DDoS attack events.

Use the service monitoring feature

Protected Objects

Asset management

After you purchase an Anti-DDoS Origin instance of a paid edition, you must add your asset that is assigned a public IP address to the instance for protection. In the following sections, an asset that is assigned a public IP address is referred to as an asset.

Add an object for protection

WAF instance management

After you purchase an Anti-DDoS Origin instance of a paid edition, you must add your Web Application Firewall (WAF) instance to the instance for protection against DDoS attacks.

Add an object for protection

GA instance management

After you purchase an Anti-DDoS Origin instance of a paid edition, you must add your Global Accelerator (GA) instance to the instance for protection against DDoS attacks.

Add an object for protection

Assets in data centers

After you purchase an anti-DDoS diversion instance, you can manually enable traffic rerouting to the instance if DDoS attacks are detected on a server in a data center. Then, traffic is rerouted to the traffic scrubbing centers of Alibaba Cloud around the world for traffic scrubbing. After the attacks stop, you can manually disable traffic rerouting to the instance to prevent an increase in service latency.

Enable traffic rerouting to an anti-DDoS diversion instance

Mitigation Settings

IP-specific mitigation policy

To protect assets of regular Alibaba Cloud services or elastic IP addresses (EIPs) with Anti-DDoS (Enhanced) enabled, you can configure IP-specific mitigation policies to filter out or allow traffic based on the policies and improve the mitigation effect on volumetric DDoS attacks at the network and transport layers.

Configure IP-specific mitigation policies

Port-specific mitigation policy

To protect EIPs with Anti-DDoS (Enhanced) enabled, you can configure port-specific mitigation policies to allow or discard traffic that has specific characteristics to mitigate TCP flood attacks (application-layer flood attacks on non-website services) that are launched against your non-website service and monitor and filter application-layer traffic in a fine-grained manner.

Configure port-specific mitigation policies

Cross-border traffic blocking policy

You can configure this type of mitigation policy to block cross-border traffic. This type of mitigation policy is suitable for scenarios in which your service does not involve cross-border traffic. In most cases, this type of mitigation policy discards traffic from specific regions based on the location of the attack source by using core routers in the backbone network of an Internet service provider (ISP).

Configure a cross-border traffic blocking policy

Attack Analysis

Attack analysis

After you add your asset that is assigned a public IP address to an Anti-DDoS Origin instance, you can query the DDoS attack events that occur on the asset and the event details on the Attack Analysis page. You can view the details of the attack mitigation process in a visualized manner. This helps improve attack analysis experience.

View information on the Attack Analysis page

Mitigation Logs

Mitigation logs

You can use the mitigation analysis feature to query and analyze mitigation logs and view mitigation reports of Anti-DDoS Origin instances.

Enable mitigation analysis

Log reports

After you enable the mitigation analysis feature, you can view mitigation reports on the DDoS BGP Mitigation Report and DDoS BGP Events Report tabs.

View mitigation reports

Billing Management

Billing management

After you purchase an Anti-DDoS Origin (Pay-as-you-go) instance, you can query the service usage on the Billing Management page.

Query bills on the Billing Management page

Instance Management

Instance management

You can view the service monitoring data and operation logs of Anti-DDoS Origin instances. You can also upgrade and renew Anti-DDoS Origin instances.

Manage instances