K-Clean Filtering DDoS Attacks Using 500G Peering Network
Information

-
Using the 500G Internet interconnection network, KINK provides network ports capable of forwarding traffic of up to 100G in case of high-volume traffic attacks.
-
This service is suitable for B2B operators who will lease space and power an IDC operator to build their own DDoS defense solution for themselves or to sell it.
Features
- Providing a direct circuit to the DDoS interworking network of KINX that is directly connected to major ISPs in Korea
- Allowing customers to apply their own DDoS solutions
- Guaranteeing non-controlled traffic of up to 100G and selectively providing ACL (UDP/ICMP filtering option)
Configuration Diagram

Functions by Product

Product | SOS | Anti-DDoS | GRE | Circuit |
---|---|---|---|---|
Product Details |
· Defense based on domain delegation · L7 caching function · WEB Service · UDP/ICMP 10G · Defense against TCP attacks (10G) · Blocking overseas attacks · Global service (Option) · Addition of domains |
· Installation of customer’s servers in the K-Clean Zone · UDP/ICMP 10G · Defense against TCP attacks (10G) · Detection and blocking of abnormal packets · Guaranteed server speed of 1Gbit/sec |
· Application of the GRE Protocol · Network bypass service · Defense against direct attacks from IP addresses · Notification for bypassing of the GRE tunnel |
· Direct connection with the DDoS interconnection network · Approval of application of customer’s own DDoS solution · Non-controlled for up to 100G · Traffic guaranteed |
ICMP, UDP Filtering | ○ | ○ | ○ | ○ |
Blocking of abnormal IP packets | ○ | ○ | ○ | |
Blocking of abnormal TCP packets | ○ | ○ | ○ | |
Blocking of abnormal UDP packets | ○ | ○ | ○ | |
Blocking of abnormal ICMP packets | ○ | ○ | ○ | |
Blocking of LAND attack packets | ○ | ○ | ○ | |
Defense against UDP flooding | ○ | ○ | ○ | |
Defense against ICMP flooding | ○ | ○ | ○ | |
SYN Flooding | ○ | ○ | ○ | |
TCP Flooding | ○ | ○ | ○ | |
HTTP Flooding | ○ | ○ | ○ | |
Defense against Fragment Flooding | ○ | ○ | ○ | |
L7 pattern check | ○ | ○ | ○ | |
Defense against spoofed IP addresses | ○ | ○ | ○ | |
Defense against DRDoS | ○ | ○ | ○ | |
URL Behavior Anomaly | ○ | ○ | ○ | |
Caching Behavior Anomaly | ○ | ○ | ○ | |
DNS Query Flooding | ○ | ○ | ○ | |
Defense against DNS Amplification attack | ○ | ○ | ○ | |
Defense against SYN flooding | ○ | ○ | ○ | |
Blocking of abnormal IP addresses | ○ | ○ | ○ | |
Improved SSL performance (SSL offload) | ○ | |||
HTTP acceleration and optimization (compression, cache, TCP reuse) | ○ | |||
Load Balancing | ○ | |||
Health Monitoring | ○ | |||
GRE Tunneling | ○ | |||
Full subnet protection without changes to the IP address (using BGP) | ○ |