Game Cloud Game deployment Best Practices Jade Deed OL

Source: Internet
Author: User
Keywords Game cloud computing game deployment Jade lease OL

"Jade Deed Ol" and security strong protection of those things

Game Introduction:

"Jade Deed Ol" is the first full view of the domestic 3D real-time multiplayer ARPG mobile games, full view 3D screen multiplayer online. The game has dazzling screen, cool fighting, multiplayer athletics, team copy, features such as tower protection. The game is about the seal of the Demon World "town Soul God Jade" was stolen, the player as a celestial warrior, was ordered to seek composure jade, so as to be able to seal thousands of demons, to dissolve the three-sector crisis. However, there are demons to seduce the world: The god of the Jade to the world! As long as the life and death contract with God Jade, you can have the power of the Magic world.

Jade Covenant Security Protection Two or three things:

The traditional IDC service provider should be slow to deal with DDoS speed and feedback to user information. Usually the customer discovers the anomaly first, then the ITU IDC asks the situation. There was once a DDoS attack, the server hosted in a computer room in Guangzhou. At that time, customer service reflects the appearance of a game clothing landing and card phenomenon. When the operation received the information, it began to trace the problem (the warning message had already sounded). First from the ping to find that ping seriously lost packets, spent 3 minutes, by pinging from different nodes, traceroute the server, the exclusion of their own network and regional network problems, locking the server on the network exception. The telephone IDC asks the situation. After 20 minutes, IDC told the server suffered DDoS attack traffic, due to large traffic, and has affected the same cabinet other companies of the normal operation of the server, IDC take the measures to break the net (fortunately not off the server Ah, otherwise a toss). This approach has led to a direct result of all of our business suspension, the loss of all aspects, business recovery time is also prolonged.

With Aliyun, we can view the real-time security situation directly by logging in to the Cloud shield. In the shortest possible time to know what happened, timely detection, timely treatment, the effect is quite good. New Product "Jade Deed" on line, the leadership of the decision, selected Aliyun platform to do support. Catches can also be subjected to large and small DDoS and ping attacks from time to time. At this time, the Cloud Shield services to provide us with a stable security. It can detect, identify and clean the attack flow in time, and maximize the guarantee of the normal operation of the customer's business. At the same time, can also be through SMS and mail timely inform customers. In this event process, the customer's technician workload is much smaller. More efficient and better service than the traditional IDC.

Learn more about game architecture scenarios >>

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.