Sudun provides always-on DDoS protection that automatically detects and mitigates attacks at the network edge. Our global network absorbs and filters malicious traffic, ensuring your applications remain available during attacks.
Attack Traffic → Sudun Edge → Detection Engine
│
┌─────────┴─────────┐
│ │
Malicious Legitimate
│ │
Dropped → Origin Server
Network and transport layer protection:
| Attack Type | Protection |
|---|---|
| UDP Floods | Automatic filtering |
| SYN Floods | SYN proxy protection |
| ACK Floods | Stateful inspection |
| ICMP Floods | Rate limiting |
| Amplification | Source validation |
Application layer protection:
| Attack Type | Protection |
|---|---|
| HTTP Floods | Request analysis |
| Slowloris | Connection management |
| Cache Busting | Smart caching |
| API Abuse | Rate limiting |
{
"ddos_protection": {
"enabled": true,
"sensitivity": "medium",
"mode": "automatic"
}
}
| Level | Description |
|---|---|
| low | High threshold, fewer false positives |
| medium | Balanced detection (recommended) |
| high | Lower threshold, faster response |
Emergency protection when under active attack:
{
"under_attack_mode": {
"enabled": true,
"challenge_passage": 300,
"auto_disable_after": "1h"
}
}
Monitor attack activity in the dashboard:
curl -X GET https://api.Sudun.com/v1/domains/{domain}/ddos \
-H "Authorization: Bearer YOUR_API_KEY"
curl -X PUT https://api.Sudun.com/v1/domains/{domain}/ddos/under-attack \
-H "Authorization: Bearer YOUR_API_KEY" \
-d '{"enabled": true}'
Need help? Contact support@Sudun.com