K-Clean Filtering DDoS Attacks Using 500G Peering Network
Information

-
Following domain delegation, K-Clean helps defend against DDoS attacks.
-
Data are cached in the customer’s server through the L7 equipment installed in the K-Clean Zone.
-
This service is suitable for companies needing prompt response to or prevention of attacks.
Features
- L7 Caching Feature
- Defend against TCP attacks and detect and block abnormal packets
- Register the IP address from which the DDoS attack arose and block traffic from the address
- Provide 24/7 traffic control to ensure normal service operation and provide detailed log and attack reports
- Global service to prevent foreign attacks (optional)
Configuration Diagram

With domain delegation, K-Clean Zone’s L7 application switch can help protect against DDoS attacks and ensure stable server operation.

Global Service Options

Based on the KINX’s global CDN PoPs located abroad, anycast and caching methods are used to disperse the attacks from overseas.

Functions by Product

Product | SOS | Anti-DDoS | GRE | Circuit |
---|---|---|---|---|
Product Details |
· Defense based on domain delegation · L7 caching function · WEB Service · UDP/ICMP 10G · Defense against TCP attacks (10G) · Blocking overseas attacks · Global service (Option) · Addition of domains |
· Installation of customer’s servers in the K-Clean Zone · UDP/ICMP 10G · Defense against TCP attacks (10G) · Detection and blocking of abnormal packets · Guaranteed server speed of 1Gbit/sec |
· Application of the GRE Protocol · Network bypass service · Defense against direct attacks from IP addresses · Notification for bypassing of the GRE tunnel |
· Direct connection with the DDoS interconnection network · Approval of application of customer’s own DDoS solution · Non-controlled for up to 100G · Traffic guaranteed |
ICMP, UDP Filtering | ○ | ○ | ○ | ○ |
Blocking of abnormal IP packets | ○ | ○ | ○ | |
Blocking of abnormal TCP packets | ○ | ○ | ○ | |
Blocking of abnormal UDP packets | ○ | ○ | ○ | |
Blocking of abnormal ICMP packets | ○ | ○ | ○ | |
Blocking of LAND attack packets | ○ | ○ | ○ | |
Defense against UDP flooding | ○ | ○ | ○ | |
Defense against ICMP flooding | ○ | ○ | ○ | |
SYN Flooding | ○ | ○ | ○ | |
TCP Flooding | ○ | ○ | ○ | |
HTTP Flooding | ○ | ○ | ○ | |
Defense against Fragment Flooding | ○ | ○ | ○ | |
L7 pattern check | ○ | ○ | ○ | |
Defense against spoofed IP addresses | ○ | ○ | ○ | |
Defense against DRDoS | ○ | ○ | ○ | |
URL Behavior Anomaly | ○ | ○ | ○ | |
Caching Behavior Anomaly | ○ | ○ | ○ | |
DNS Query Flooding | ○ | ○ | ○ | |
Defense against DNS Amplification attack | ○ | ○ | ○ | |
Defense against SYN flooding | ○ | ○ | ○ | |
Blocking of abnormal IP addresses | ○ | ○ | ○ | |
Improved SSL performance (SSL offload) | ○ | |||
HTTP acceleration and optimization (compression, cache, TCP reuse) | ○ | |||
Load Balancing | ○ | |||
Health Monitoring | ○ | |||
GRE Tunneling | ○ | |||
Full subnet protection without changes to the IP address (using BGP) | ○ |