ACSI developed a Distributed Denial-of-Service (hereafter referred to as DDoS) attack system for the purpose of drill, which by using a lot of distributed attack sources providing attack scenario which emulates utmost reality.
Are you still doing the scenario exercises on words without real action?
Can your DDoS defense mechanism work effectively when encountering attacks?
Since the beginning of 2015, DDoS attacks on government agencies and financial institutions have often made headlines. The competent authorities have struggled for countermeasures and informed subordinates of the need to create contingency mechanism and drills. Security suppliers have also developed defense equipment or services against DDoS attacks.
Since the objects of DDoS attacks are generally targeted, such as political or speech issues, blackmails, and other factors, the frequency of attacks is lower and more unpredictable compared to other information security threats. Therefore, it is not easy to perform effective defense test when a DDoS defense mechanism is built. However, situational drills are only a passive solution, which cannot evaluate the effectiveness of the defense mechanism.
ACSI has observed such blind spot, and has independently researched and developed a DDoS attack system to provide customers with real, controllable, and measurable attack drill services, and to assist customers in evaluating whether the DDoS defense mechanism operates correctly and mitigates attack traffic effectively when encountering real attacks. ACSI can attack layers 3 or 4 (network/transport layer) and layer 7 (application layer, which bandwidth is usually low) of the OSI network model from different IP addresses, which could be distributed domestically or overseas, such that drills are closer to real situations.
A drill service can emulate a hacking DDoS behavior to attack tested target (such as website, host, network, etc.) according to scheduled time and attack means without affecting normal operation. The attack drill will not cause any system damage, data loss and other conditions to the tested target. This service has been adopted by a number of government agencies and financial institutes, and has received good appraisal and recognition.
Figure 1: Service flow chart
- Flood Volume Attack drill service (line bandwidth is the target of the drill)
- Slow HTTP Attack drill service (website service is the target of the drill)