X
验证码
说明
CHS  简体中文    EN  English    JPN  日本語
Shanghai Data Solution Co., Ltd
Shanghai Data Solution Co., Ltd
•  Download     •  Login    •  Customer service     •  Customer system
Traffic Scrubbing
It is designed to timely detect abnormal network flows, including DOS attacks, by maintaining a real time monitoring over data traffic entering a customer’s IDC, and scrub off the abnormal traffic without compromising any normal business operation. In addition to meet clients’ need of maintaining continuous and smooth network service, it shall improve the visibility of the user’s network traffic and present a clear view of the user’s network security status via such service components as time notices and analysis reports.
Product Introduction
Product Functions
 Zoom Out
 Zoom In
Product Introduction
Product Positioning
 

The target customers of the product include: large and midsize IDC users, particularly those who have to depend business operation on a stable network service and who cannot afford the potentially huge damage on business turnover caused by network attacks, e.g. DDoS attacks. Specifically speaking, they are: financial institutions, online game providers, E-commerce operators and content providers;

Deployment Plan
 

Install and connect the threat detectors and scrubbing equipments at the outlets of an IDC and achieve the anti-DDoS protection by guiding the traffic scrubbing via routing.

System Structure
 

The Anti-DDoS Traffic Scrubbing system is made up of three parts, i.e. attack threat detecting, attack mitigating and monitoring management.

The detecting system keeps monitoring the illegal attack traffic hidden in the network flows, timely set off attack warning after identifying any attack, and activate the protecting equipments to scrub off the attack traffic;
The attack mitigating system shall use professional traffic purification products to re-route the suspicious traffic from the original network path to the traffic purification product, and then identify and peel off malicious traffics, and then return the legal traffic back into the network and the intended systems, without affecting the forward-path of any other legal traffic;
The monitoring management system is designed to maintain a centralized management over the equipments in the traffic purification system. Its functions include: equipment configuration management, real-time traffic report, alarms report, status information monitoring, as well as timely generating traffic analysis report, attack defense report, and other relevant reports;
0
Data Center
For more information about Data Center, please click here
Cloud Computing
With Cloud Computing technologies, the user can invest more resources available on more important applications and access the computing and storage systems according to specific needs.
IT Service
With SDS’s network service products, you now have the freedom to re-deploy staff and help them focusing on the challenges of key businesses and on planning the future.