Deze pagina is nog niet beschikbaar in uw eigen taal. We werken er hard aan om meer taalversies toe te voegen. Bedankt voor uw steun.
- What's New
- Function Overview
- Service Overview
- Getting Started
- User Guide
- Best Practices
-
API Reference
- API Usage Guidelines
- Before You Start
- API Overview
- API Calling
-
API
-
Anti-DDoS Management
- Querying the List of Defense Statuses of EIPs
- Querying Optional Anti-DDoS Defense Policies
- Querying Weekly Defense Statistics
- Querying Configured Anti-DDoS Defense Policies
- Updating Anti-DDoS Defense Policies
- Querying the Traffic of a Specified EIP
- Querying Events of a Specified EIP
- Querying Configured Anti-DDoS Defense Policies
- Anti-DDoS Task Management
- Alarm configuration management
-
Anti-DDoS Management
- Examples
- Appendix
- Out-of-Date APIs
- SDK Reference
-
FAQs
-
General FAQs
- What Are Regions and AZs?
- What Is the Black Hole Policy of HUAWEI CLOUD?
- What Are a SYN Flood Attack and an ACK Flood Attack?
- What Is a CC Attack?
- What Is a Slow HTTP Attack?
- What Are a UDP Attack and a TCP Attack?
- What Are the Differences Between DDoS Attacks and Challenge Collapsar Attacks?
- Does Anti-DDoS Provide SDKs and APIs?
- CNAD Basic (Anti-DDoS) FAQs
-
General FAQs
- Videos
Show all
What Are the Differences Between DDoS Attacks and Challenge Collapsar Attacks?
Challenge Collapsar (CC) attack is a type of Distributed Denial of Service (DDoS) attack.
DDoS Attack
DDoS attacks are distributed and coordinated large-scale DoS attacks. Multiple attackers in different locations launch attacks to one or more targets at the same time, or an attacker controls multiple compromised computers in different locations and uses these computers to attack the victim at the same time. The DDoS attack process consists of target confirmation, botnet establishment, attack launching.

CC Attack
A Challenge Collapsar (CC) attack is an attack that standard HTTP requests are sent to a targeted web server frequently. The attacker controls some servers to keep sending a large number of data packets to the target server, causing resource exhaustion and breakdown of the server.

Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.