Comparing Security Cloud Tools: Alibaba Cloud Anti-DDoS vs. AWS Shield

简介: To maintain a secure web application, you need to invest in security tools. But because there are so many security tools available, it can be difficult to decide which one to choose.

SE_005

To maintain a secure web application, you need to invest in security tools. But because there are so many security tools available, it can be difficult to decide which one to choose. Most cloud platforms offer security services to help protect workloads, and you may not know which one is the best fit for your needs.

In this post, we will walk through the use of two major cloud security services: Alibaba Cloud’s Anti-DDoS tool and AWS Shield. Both solutions offer protection against denial-of-service attacks on cloud workloads. Below, we’ll take a look at how each service is set up, with the goal of determining which is a better fit for a given workload or use case.

Alibaba Cloud Anti-DDoS

As its name implies, Alibaba Cloud Anti-DDoS is a tool that protects web applications against DDoS attacks that aim to overload server bandwidth or overload resources until they run out, and the server stops responding.

Alibaba Cloud Anti-DDoS is available in two tiers: a Basic version and a Pro one. The following table shows how the two offerings compare feature-wise:

Anti-DDos Basic

Anti-DDos Pro

SYN SYN flood
Flood UDP flood
UDP Flood ACK flood
ICMP Flood ICMP flood
fragments DNS query flood
malformed packets NTP reply flood
  HTTP flood attack
  Web application attacks
  Protection layer 4 and 7
As you can see, Anti-DDoS Pro has a wider range of options for attack protection that will guarantee greater security for your web application. It also protects the application and server from the most common attacks, along with the most complex ones. With the Pro version, the mitigation capacity goes from 5 Gbps, which is the capacity defended by Basic, to 2 Tbps.

Tool test

By default, Anti-DDoS is automatically enabled when you create an instance. However, at some point, some parameters will have to be changed so that it responds according to your needs. In the test that I performed, an ECS was created, and I will demonstrate the functioning of the Anti-DDoS service with the available instance. On the main dashboard, you’ll find the option for Anti-DDoS in the Security menu:
1

The first impression is that it is not working; however, the service will be available in the region the instance was created in. In my case, it was created in Asia Pacific SE 1 (Singapore). Note that this dashboard shows the South China 1 region preselected, so you may need to modify where the instance is.

2

After selecting where the instance is, you can see that there is already a level of security in the Basic model for the ECS created.

3

We can see that the instance has not suffered an attack. We can still see two monitoring tabs, one labeled Traffic (bps) and the other Packets Per Second (pps). In this same screen, we can see that the Basic plan does not support CC attacks, so you should evaluate whether the Basic option is best for you.

Through the following screenshots, I will show the contents of the View Details option.

4

5

6

The Whitelist setting button is for feeding a list of allowed addresses if you have enabled and configured the WAF. Below are some Anti-DDoS settings, starting with the report.

Security report

In any of the options you select, the data filter options will be the same. It is easy to generate daily, weekly, and monthly reports.

7

The web protection configuration can be visualized fully in the official documentation, which is available here.

AWS Shield

Amazon offers its own service against DDoS attacks—AWS Shield. Like Anti-DDoS, it also has two levels of protection: Standard and Advanced. Standard protects by default all applications configured on Amazon, and common attacks on the network and transport layers. At the Advanced level, you get more protection and the option of customizing defense rules, just as with Anti-DDoS.

A general comparison of the two levels of protection is shown in the table below:

Comparison of Alibaba Cloud Anti-DDoS and AWS Shield Features
Feature AWS Shield Standard AWS Shield Advanced Anti-DDoS Basic Anti-DDoS Pro
Traffic monitoring
Network flow monitoring Yes Yes Yes Yes
Automatic always-on detection Yes Yes Yes Yes
Application traffic monitoring No Yes Yes Yes
Attack mitigation
Protection from common DDoS attacks (e.g. SYN floods, ACK floods, UDP floods, Reflection attacks) Yes Yes Yes Yes
SYN flood Yes Yes Yes Yes
UDP Flood Yes Yes Yes Yes
ICMP Flood Yes Yes Yes Yes
fragments Yes Yes Yes Yes
malformed packets Yes Yes Yes Yes
HTTP flood attack No Yes No Yes
Web application attacks No Yes No Yes
Protection layer 4 No Yes No Yes
Protection layer 7 No Yes No Yes

Tool test

After logging into the AWS console, we need to locate the AWS Shield service.

8

Choose the service you want to access and configure. I clicked Go to AWS Shield.

9

To my surprise, I was directed to a different screen that contained the WAF settings.

10

11

When I clicked on any icon in AWS Shield, page blocking wasn’t an option, forcing me to activate Advanced to proceed, which costs $ 3,000 per month just for the activation.

12

Unfortunately, my test of AWS Shield ends here because enabling activation just to test the tool is so costly. But, unlike AWS Shield, Alibaba Cloud offers a $300 credit to test the tool as much as you like, and you can simulate an environment that closely matches your requirements.

Conclusion

As we can see, both tools are similar, differentiating on the data capacity that will be served, depending on the level of protection desired. High availability at 99.99%, automatic mitigation, and 24/7 support are offered by both. However, one difference that stands out is Alibaba Cloud’s Anti-DDoS built-in for application monitoring. AWS provides monitoring through other services. To me, it’s an advantage to have monitoring features built-in so that I do not have to seek out and use multiple tools. This makes Alibaba Cloud Anti-DDoS attractive if you are seeking a “single pane of glass” with which to manage cloud application security.

Bio

13
Brena Monteiro is a Fixate IO Contributor and a software engineer with experience in the analysis and development of systems. She is a free software enthusiast and an apprentice of new technologies.
目录
相关文章
|
数据采集 存储 分布式计算
一篇文章搞懂数据仓库:数据治理(目的、方法、流程)
一篇文章搞懂数据仓库:数据治理(目的、方法、流程)
28451 2
一篇文章搞懂数据仓库:数据治理(目的、方法、流程)
|
5月前
|
安全 数据安全/隐私保护
Web渗透-逻辑漏洞
逻辑漏洞主要因程序逻辑不严谨或复杂导致处理错误,常见于越权访问、密码修改、支付等环节。漏洞统计显示,越权操作和逻辑漏洞占比最高,尤其账号安全风险突出,如任意重置密码、验证码暴力破解等。漏洞分类中,越权访问分为水平越权(同权限用户间数据访问)和垂直越权(跨权限数据访问)。
242 0
Web渗透-逻辑漏洞
|
自动驾驶 5G 调度
|
人工智能 JSON 自然语言处理
开源模型+Orchestrating Agents多智能体框架,易用、强大且可控
本文采用开源Qwen2.5-14B-instruct-GGUF来体验多智能体编排和交接,希望在体验多智能体编排和交接框架的同时,一起评估中小参数规模的模型(14B)能否较好的完成多智能体任务。
|
SQL 安全 数据库
基于SQL Server事务日志的数据库恢复技术及实战代码详解
基于事务日志的数据库恢复技术是SQL Server中一个非常强大的功能,它能够帮助数据库管理员在数据丢失或损坏的情况下,有效地恢复数据。通过定期备份数据库和事务日志,并在需要时按照正确的步骤恢复,可以最大限度地减少数据丢失的风险。需要注意的是,恢复数据是一个需要谨慎操作的过程,建议在执行恢复操作之前,详细了解相关的操作步骤和注意事项,以确保数据的安全和完整。
713 0
yolov5项目如何安装pycocotools和opencv-python?
本文提供了解决yolov5项目中安装pycocotools和opencv-python包失败的两种方法:手动安装或使用国内镜像源进行安装。
yolov5项目如何安装pycocotools和opencv-python?
|
存储 SQL Cloud Native
技术解析:阿里云 AnalyticDB 如何实现全球性能第一
北京时间 2020 年 5 月 4 日,TPC 官网正式公布,阿里云自研云原生数据仓库 AnalyticDB 通过严苛的 TPC-DS 全流程测试,性能较前世界纪录提升 29%,单位成本仅为其 1/3,再次成为全球性能领先的数据仓库。本文将对 AnalyticDB 进行全面解析,详细阐述其技术架构及存储和查询技术,并对 AnalyticDB 的下一步发展做出展望。
4051 0
技术解析:阿里云 AnalyticDB 如何实现全球性能第一
数据库系统工程师考点笔记
数据库系统工程师考点笔记
1607 0
|
存储 网络协议 算法
电子邮件协议(SMTP,MIME,POP3,IMAP)
电子邮件协议(SMTP,MIME,POP3,IMAP)
2939 1
|
传感器 数据可视化
LC串联谐振拓扑仿真建模及控制策略分析
该文介绍了直流高压电源的应用领域,特别是LC串联谐振拓扑在其中的重要性。文章接着详细阐述了LC串联谐振变换器的工作模式,重点讨论了在DCM模式下的电路参数设计,包括变压器变比、谐振频率和器件参数等,并使用Simulink搭建模型进行电路仿真。仿真过程分为电路模型搭建、开环调试和闭环调试,验证了输出电压可调且能稳定在设定值,实现了变换器的设计目标。
431 2