Last update:2026-04-17 16:33:18
Flood Shield 2.0 is an integrated service for application delivery and security. It integrates CDN acceleration, large-scale Layer 3 and Layer 4 DDoS mitigation, TCP/UDP application acceleration and protection, and Layer 7 defense based on a WAAP architecture. Flood Shield 2.0 is designed for services that require both performance and protection across web and non-web traffic, especially in environments exposed to high attack frequency, large traffic bursts, or multi-vector attack scenarios.
Public-facing services may encounter high-volume attacks targeting the network and transport layers, such as SYN floods, UDP floods, and amplification attacks. These attacks may consume bandwidth or connection resources and affect service availability.
In this scenario, Flood Shield 2.0 can help by:
This helps filter malicious traffic before it reaches the origin.
Some attacks target the application layer through HTTP/HTTPS requests, including HTTP floods, API abuse, credential stuffing, and automated bot traffic. These attacks may resemble normal requests and are difficult to handle through network-layer protection alone.
In this scenario, Flood Shield 2.0 can help by:
This enables accurate detection and mitigation without significantly impacting normal user behavior.
In many real-world cases, attackers combine volumetric attacks with application-layer attacks to increase impact and bypass single-layer defenses.
In this scenario, Flood Shield 2.0 can help by:
This is suitable for services exposed to changing or combined attack methods.
Some services rely on TCP or UDP instead of standard web traffic, such as online gaming, real-time communication, and custom application protocols. These services may require both acceleration and attack protection beyond traditional web security models.
In this scenario, Flood Shield 2.0 can help by:
This allows organizations to protect both web and non-web services within a single platform.
Business events such as promotions, live streaming, or game launches can generate sudden traffic spikes that resemble attack patterns.
Flood Shield 2.0 differentiates between legitimate surges and malicious traffic through:
This ensures that legitimate users can access services smoothly during peak periods.