Updated on 2023-06-07 GMT+08:00

DDoS

Overview

In a DDoS attack, an attacker uses compromised computers on the Internet to launch DoS attacks on the target. DoS attacks, also called flood attacks, are intended to exhaust the network or system resources on the target computer, causing services to be interrupted or suspended, so legitimate users are unable to access network services.

The basic, standard, and professional editions can detect more than 100 types of DDoS attacks.

Suggestion

If SA detects that an application system is experiencing a DDoS attack, SA will report an Informational alarm. You are advised to purchase an AAD instance for better protection.