Application Scenario

최신 업데이트:2026-04-17 16:33:18

Flood Shield 2.0 is an integrated service for application delivery and security. It integrates CDN acceleration, large-scale Layer 3 and Layer 4 DDoS mitigation, TCP/UDP application acceleration and protection, and Layer 7 defense based on a WAAP architecture. Flood Shield 2.0 is designed for services that require both performance and protection across web and non-web traffic, especially in environments exposed to high attack frequency, large traffic bursts, or multi-vector attack scenarios.

Large-Scale L3/L4 DDoS Attacks

Public-facing services may encounter high-volume attacks targeting the network and transport layers, such as SYN floods, UDP floods, and amplification attacks. These attacks may consume bandwidth or connection resources and affect service availability.
In this scenario, Flood Shield 2.0 can help by:

  • Always-on traffic diversion to dedicated scrubbing centers for large-scale cleaning
  • Protocol-level validation and abnormal traffic filtering
  • Adaptive rate limiting and connection control based on traffic patterns

This helps filter malicious traffic before it reaches the origin.

L7 Attacks and Automated Bot Traffic

Some attacks target the application layer through HTTP/HTTPS requests, including HTTP floods, API abuse, credential stuffing, and automated bot traffic. These attacks may resemble normal requests and are difficult to handle through network-layer protection alone.
In this scenario, Flood Shield 2.0 can help by:

  • Inspecting and filtering malicious HTTP/HTTPS requests
  • Detecting and mitigating automated bot traffic
  • Identifying abnormal API request patterns and applying access control
  • Mitigating Layer 7 DDoS traffic

This enables accurate detection and mitigation without significantly impacting normal user behavior.

Mixed Attack Scenarios (L3–L7 Combined Attacks)

In many real-world cases, attackers combine volumetric attacks with application-layer attacks to increase impact and bypass single-layer defenses.
In this scenario, Flood Shield 2.0 can help by:

  • Simultaneously analyzing and mitigating Layer 3, Layer 4, and Layer 7 traffic
  • Applying protection policies across multiple layers
  • Correlating traffic patterns to identify multi-vector attacks

This is suitable for services exposed to changing or combined attack methods.

TCP/UDP Application Protection

Some services rely on TCP or UDP instead of standard web traffic, such as online gaming, real-time communication, and custom application protocols. These services may require both acceleration and attack protection beyond traditional web security models.

In this scenario, Flood Shield 2.0 can help by:

  • Providing L3/L4 DDoS protection for TCP/UDP traffic
  • Helping maintain service continuity and reduce disruption during attack mitigation
  • Applying protocol-aware filtering to distinguish legitimate traffic from malicious packets

This allows organizations to protect both web and non-web services within a single platform.

Flash Crowd and Traffic Surge Handling

Business events such as promotions, live streaming, or game launches can generate sudden traffic spikes that resemble attack patterns.
Flood Shield 2.0 differentiates between legitimate surges and malicious traffic through:

  • Behavioral analysis and traffic baselining
  • Dynamic threshold adjustment based on real-time conditions
  • Elastic resource scaling to absorb traffic spikes

This ensures that legitimate users can access services smoothly during peak periods.

이 문서의 내용이 도움이 되었습니까?
아니오
정상적으로 제출되었습니다.피드백을 주셔서 감사합니다.앞으로도 개선을 위해 노력하겠습니다.