Sudun provides continuous DDoS protection services that automatically detect and mitigate attacks at the network edge. Our global network absorbs and filters malicious traffic, ensuring that your applications remain available in the event of an attack.
攻击流量 → Sudun边缘节点 → 检测引擎
│
┌─────────┴─────────┐
│ │
恶意流量 合法流量
│ │
被拦截 → 源服务器
Network and transport layer protection:
| Attack type | Protective measures |
|---|---|
| UDP flood attack | Automatic filtering |
| SYN flood attack | SYN proxy protection |
| ACK flood attack | Status detection |
| ICMP flood attack | Rate limiting |
| Amplify the attack | Source validation |
Application layer protection:
| Attack type | Protective measures |
|---|---|
| HTTP flood attack | Request analytics |
| Slowloris attack | Connection management |
| Cache penetration attacks | Smart caching |
| API abuse attacks | Rate limiting |
{
"ddos_protection": {
"enabled": true,
"sensitivity": "medium",
"mode": "automatic"
}
}
| level | Description |
|---|---|
| low | High threshold, fewer false positives |
| Medium | Balance test (recommended) |
| High | Low threshold, faster response |
Emergency protection in the event of an active attack:
{
"under_attack_mode": {
"enabled": true,
"challenge_passage": 300,
"auto_disable_after": "1h"
}
}
Monitor attack activity in the dashboard:
curl -X GET https://api.Sudun.com/v1/domains/{domain}/ddos \
-H "Authorization: Bearer YOUR_API_KEY"
curl -X PUT https://api.Sudun.com/v1/domains/{domain}/ddos/under-attack \
-H "Authorization: Bearer YOUR_API_KEY" \
-d '{"enabled": true}'
Need help? Please contact support@Sudun.com