Value Added Services
- This function allows the carrier to analyze the history of the subscriber’s visit and his behavior on resources, display targeted advertising and information messages at any time, and segment subscribers according to the accumulated billing data.
- The turnkey service for traffic monetizing is designed to generate additional profit for the operator by displaying advertising banners on HTTP pages.
- Stingray Service Gateway has built-in protection against Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks – these are types of attacks on computer systems when users cannot access the provided system resources or this access is difficult.
The home page management feature gives the opportunity to get full information about the subscriber (gender, age, browser, input devices, preferences, etc.), sell partner services through it, conduct surveys for promotion QoS, promote new services, and raise traffic from their pages description. Here are examples of the use cases that you can use with this feature:
A function that allows the carrier to send messages to the subscriber while working on the Internet. The user enters the address of the site that he wants to visit and sees in the browser a carrier’s message, which is replaced after a few seconds by the requested page.
The message for subscribers can contain both information from the carrier (changes in the tariff, routine or emergency technical works, special offers), and emergency messages from government agencies (warning of emergencies).
Each user of the network is unique. The Stingray platform can collect information about its behavior without violating the subscriber’s personal rights, and show it in a clear view to the carrier.
This information can be used in many ways, primarily to improve the quality of the provided services. In the hands of an experienced marketing expert, the collected information can be a tool for increasing the number of subscribers and the company’s revenue.
Less than a minute of showing a unique “home page” to a subscriber allows the carrier to obtain a large amount of information about the user, offer him or her a new service or product in the light of his interests, assess his or her satisfaction with the provided services.
The service is relevant to use in free Wi-Fi networks in conjunction with the HotSpot module: a subscriber who logs into your Wi-Fi network can be connected to an ad display.
- Learn your audience interests
- Choose subtle settings for each category
- Show only relevant advertisement
- Earn on your traffic
- See full statistics
This service is supported only with an in-line installation scheme.
The DPI with GUI platform connects the ads aggregator resource via VAS Cloud. When the subscriber observes this advertisement, the reverse process occurs: GUI calculates the number of impressions, clicks, and sum of money that the operator receives.
The advertising partnership service is connected to VAS Cloud. Once connected, enable list downloading on one or more DPI devices. DPI will load information about which banners to display on which resources. Enabling this option requires a restart of the DPI.
Statistics and Accruals
The Statistics section provides daily statistics on the number of impressions and clicks, as well as the number of leads generated on the advertiser’s side. You can select a specific period of time. Approved leads converted to purchase are updated daily and displayed in the “Commission” bar.
The Interaction Is Handled According To The Following Algorithm:
The service is available after registration in the operator’s personal account.
The operator activates the service in the graphical user interface.
The list of HTTP resources to show ads on is automatically loaded from VAS Cloud to VAS Experts DPI (this list is determined by the cloud).
When switching to any resource from the DPI list, it injects a banner code that is automatically loaded from the VAS Cloud (the banner is determined by the cloud).
The operator determines for which subscribers to activate the advertising display service.
Banners are shown to subscribers. The advertising aggregator receives information about impressions and clicks and counts the ISP's gain.
The operator can request a withdrawal of these earnings from the VAS Cloud personal account at any time.
The attack is carried out from the attacker’s computer or entire network (botnet) of devices, and this can be any device having access to the Internet (router, TV, tablet, etc.). The user may not know that the attack is carried out from his or her device. In this case, protection of remote resources and applications should be performed by the carrier’s equipment.
- Performance up to 20 million packets per second, depending on the configuration.
- Protection against TCP SYN Flood and fragmented UDP Flood.
- Protection against DDoS (LOIC etc) based on The Turing Test (Human Detection).
- Dynamic control of the bandwidth, common and up to a separate IP.
- Prioritization by common bandwidth and separate IP protocols.
This computer test determines who the user of the system is – a person or a computer.
If the threshold value is exceeded, for example, the number of requests per second is comfortable for the site, the protection is activated and the user needs to enter information from CAPTCHA to confirm that he or she is not involved in the botnet network, and only then access to the site will be allowed.
After confirmation, the user is entered into the Allow List and is no longer checked.
SYN Flood attack causes increased consumption of resources of the attacked system. Denial of service occurs when the flow of SYN-flood is 100 000 – 500 000 packets per second. At the same time, even a gigabit channel will allow an attacker to send to the attacked site a stream of up to 1.5 million packets per second.
Stingray SG detects independently an attack on exceeding a specified threshold of unconfirmed SYN requests and, instead of the protected site, responds to SYN requests and organizes a TCP session with the protected site after confirmation of the request by the client.
This type of attack is carried out by fragmented UDP-packets, usually a short one, for the assembly and analysis of which the attacked platform is forced to spend a lot of resources.
Protection is carried out by discarding a set of protocols that is irrelevant for the protected site or rigid restriction of them over a passed band.