DDoS
Overview
In a DDoS attack, an attacker uses compromised computers on the Internet to launch DoS attacks on the target. DoS attacks, also called flood attacks, are intended to exhaust the network or system resources on the target computer, causing services to be interrupted or suspended, so legitimate users are unable to access network services.
The basic, standard, and professional editions can detect more than 100 types of DDoS attacks.
Suggestion
If SA detects that an application system is experiencing a DDoS attack, SA will report an Informational alarm. You are advised to purchase an AAD instance for better protection.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot