Select your cookie preferences

We use essential cookies and similar tools that are necessary to provide our site and services. We use performance cookies to collect anonymous statistics, so we can understand how customers use our site and make improvements. Essential cookies cannot be deactivated, but you can choose “Customize” or “Decline” to decline performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide useful site features, remember your preferences, and display relevant content, including relevant advertising. To accept or decline all non-essential cookies, choose “Accept” or “Decline.” To make more detailed choices, choose “Customize.”

Skip to main content

AWS Shield

Maximize application availability and responsiveness with managed DDoS protection

What is a DDoS attack?

A Denial of Service (DoS) attack is a malicious attempt to affect the availability of a targeted system, such as a website or application, to legitimate end users. Typically, attackers generate large volumes of packets or requests ultimately overwhelming the target system. In case of a Distributed Denial of Service (DDoS) attack, and the attacker uses multiple compromised or controlled sources to generate the attack.

In general, DDoS attacks can be segregated by which layer of the Open Systems Interconnection (OSI) model they attack. They are most common at the Network (layer 3), Transport (Layer 4), Presentation (Layer 6) and Application (Layer 7) Layers.

Benefits of AWS Shield

Automatically detect and mitigate sophisticated network and application layer Distributed denial of service (DDoS) events.

Customize application protection against DDoS risks through integrations with Shield Response Team (SRT) protocol or AWS WAF.
Gain visibility, insights, and cost savings for DDoS events that impact your AWS resources.

Use cases

Protect applications and APIs from SYN floods, UDP floods, or other reflection attacks.

Learn more about protecting web applications and APIs

Deploy inline mitigations such as deterministic packet filtering and priority-based traffic shaping to stop basic network-layer attacks.

Learn more about protecting latency-sensitive applications 

Activate automatic detection, mitigation, or protection for each resource type per AWS account.

Learn more about resource protection