The Abnormal Traffic Inspection & Control System (ATIC) consists of a detection center, a cleaning center, and a management center. The detection center detects optical splitting or mirroring traffic. When it detects a traffic abnormality in a defended IP address, it immediately notifies the management center which in turn requests the cleaning center to divert the abnormal traffic.
Advanced Anti-DDoS is an advanced defense service based on anti-DDoS traffic cleaning devices and a big data operation platform. It hides and protects users' source sites by forwarding traffic.
The Border Gateway Protocol (BGP) is an interautonomous system routing protocol running over TCP. A BGP system is used to exchange routing information with another BGP system.
In a Distributed Denial of Service (DDoS) attack, the attacker uses a multitude of compromised systems to attack a single target or multiple targets. Use of many compromised computers increases the power of the attack.
A domain name server (DNS) is a functional entity in the TCP/IP network. With deployment of the DNS, subscribers can access related servers using corresponding domain names. In the TCP/IP network, a domain name maps an IP address. Domain names are easier to remember but servers in the network communicate with each other using IP addresses. Therefore the DNS is used to convert domain names to corresponding IP addresses.
The Linux Virtual Server (LVS) is a virtual server cluster used to balance loads among servers. Working in the network layer, it can be used to implement high-performance, high-availability server cluster technologies.
By Network Address Translation (NAT), private IP addresses are translated into public ones to allow users who only have private IP addresses to access the Internet, thereby relieving the impact of lack of IPv4 addresses.
According to the RFC 793 definition of the Internet Engineering Task Force (IETF), the Transmission Control Protocol (TCP) is a reliable transmission-layer protocol oriented to connections and based on byte streams.
The User Datagram Protocol is a connectionless transmission-layer protocol that provides transaction-oriented transmission service of simple but unreliable information. IETF RFC 768 is the official specifications of UDP. The protocol ID of UDP in IP packets is 17.
Thank you for your score！Your feedback would help us improve the website.