Flood Shield

Distributed Cloud-based DDoS Mitigation Solution
Flood Shield is a comprehensive cloud-based DDoS protection service that delivers fast, simple, and effective DDoS protection to ensure the stability of your origin against distributed denial-of-service attacks (such as SYN Flood, ACK Flood, UDP Flood, HTTP Flood, etc.) in real time, and simultaneously provides an acceleration service to legitimate users to optimize the user experience. This solution functions as a shield to ensure the stability and reliability of online services and infrastructures.

Huge Mitigation Capacity

With 12+ Global DDoS Scrubbing Center and 15+ Tbps of Mitigation Capacity, Flood Shield protects your business against even the most sophisticated and large-scale volumetric attacks.

Mitigation Visibility

Flood Shield provides visibility into all your DDoS attacks, including Layer 3/4 and Layer 7 DDoS dashboard and log.

BGP Anycast Mitigation

BGP Anycast technology mitigate the attack traffic disperses intelligently, then inject back the normal traffic after the scrubbing is completed.

Apply for a FREE Trial

  • Hidden
    Product of Interest
  • This field is for validation purposes and should be left unchanged.


Mitigation Capacity

12+ Global DDoS Scrubbing Center
15+ Tbps of Mitigation Capacity

DDoS Attack Mitigation

Layer 3/4 and Layer 7 DDoS mitigation, including SYN Flood, ACK Flood, ICMP Flood, UDP Flood, HTTP Flood, SlowLoris attack, etc.

Customized Policies

Customize access policies and rate limiting in advance to avoid attacks and abuse of resources.

Preset Protection

Three preset DDoS attack protection modes are available and easy to switch when responding to different types of attacks.

Alert and Monitoring

Comprehensive monitoring and alerting services to rapidly notify about any website abnormalities, including L3/4 and L7 DDoS attack alerting.

Multiple Protocols

HTTP/HTTPS and TCP/UDP protocols are supported to meet different business types.

Flexible Pricing

We provide flexible pricing models that are designed in accordance with your risk profile, allowing you to pay in the most effective way that suits your business’s needs. There are unlimited mitigation and elastic mitigation plans that you can choose based on your budget.

Comprehensive Multi-Layered Security

CDNetworks provides a comprehensive multi-layered security solution that covers DDoS protection, Web Application Firewall (WAF), API security and gateway, Bot management and specific attack deflection modules, to protect your service and applications. By using our single portal for multiple products, you can save significantly on maintenance costs while simplifying operations for your team.

Mitigation Visibility

Flood Shield provides visibility into all your DDoS attacks and cyber attacks and threats with comprehensive and intuitive security dashboards. The dashboards display a summary of information about Layer 3/4 and Layer 7 attacks that have been detected by CDNetworks Flood Shield. The information data is automatically updated in near real-time when significant attacks happen, which includes DDoS attack bandwidth, attack IP list, attack map, attack types and count, etc. You can use the data to better understand attack trends, and come up with the right strategies to quickly optimize your network security to combat DDoS threats in the future.

How our DDoS Protection Services Work

Flood Shield DDoS deflection technology is deployed on CDNetworks’ distributed Points-of-Presence (PoPs). It is a cloud-based “always-on” mitigation service with virtually unlimited capacity. It does not require sophisticated deployments and changes to customers’ networks and provides transparent scaling automation. Flood Shield is provided either via a simple DNS change, typically to protect websites, HTTP/S traffic and entire network infrastructures, including multiple domains, servers, and protocols. With the customer traffic routed through CDNetworks’ PoPs, DDoS attacks hit the CDNetworks infrastructure rather than the customers’ servers and networks. CDNetworks’ PoPs detect and deflect both application-layer attacks (L7) and all known types of network-layer attacks (L3/L4).