• Product
    • Product
    • Supplier

Drill Service of Distributed Denial of Service Attack

Acer Cyber Security IncorporatedMore About This Product
Request for Quotation

Drill Service of Distributed Denial of Service Attack


  • Operating Systems Supported : DOS
  • Products Status : Stock
  • Version Type : Enterprise

Key Features

Service Features

ACSI developed a Distributed Denial-of-Service (hereafter referred to as DDoS) attack system for the purpose of drill, which by using a lot of distributed attack sources providing attack scenario which emulates utmost reality.

Service Description

Are you still doing the scenario exercises on words without real action?

Can your DDoS defense mechanism work effectively when encountering attacks?

Since the beginning of 2015, DDoS attacks on government agencies and financial institutions have often made headlines. The competent authorities have struggled for countermeasures and informed subordinates of the need to create contingency mechanism and drills. Security suppliers have also developed defense equipment or services against DDoS attacks.

Since the objects of DDoS attacks are generally targeted, such as political or speech issues, blackmails, and other factors, the frequency of attacks is lower and more unpredictable compared to other information security threats. Therefore, it is not easy to perform effective defense test when a DDoS defense mechanism is built. However, situational drills are only a passive solution, which cannot evaluate the effectiveness of the defense mechanism.

ACSI has observed such blind spot, and has independently researched and developed a DDoS attack system to provide customers with real, controllable, and measurable attack drill services, and to assist customers in evaluating whether the DDoS defense mechanism operates correctly and mitigates attack traffic effectively when encountering real attacks. ACSI can attack layers 3 or 4 (network/transport layer) and layer 7 (application layer, which bandwidth is usually low) of the OSI network model from different IP addresses, which could be distributed domestically or overseas, such that drills are closer to real situations.

A drill service can emulate a hacking DDoS behavior to attack tested target (such as website, host, network, etc.) according to scheduled time and attack means without affecting normal operation. The attack drill will not cause any system damage, data loss and other conditions to the tested target. This service has been adopted by a number of government agencies and financial institutes, and has received good appraisal and recognition.

Figure 1: Service flow chart

Service Items

  • Flood Volume Attack drill service (line bandwidth is the target of the drill)
  • Slow HTTP Attack drill service (website service is the target of the drill)

Last Update : 2019-03-18
LoadingLoading ...

The purpose of Slider Kit is to gather common slideshow-like jQuery functionalities (such as news sliders, photos galleries/sliders, carousels, tabs menus)

When tracking mouse movement, you usually need to know the actual position of the mouse pointer. The event object that is passed to the handler contains some information about the mouse coordinates.

Step 1Fill in the formStep 2Completion

Mrs.凌秋玉 , Acer Cyber Security Incorporated

Insert a template

File formats: htm, html, doc, docx, pdf, txt, jpg, gif, png. Max 3 files (10MB in total).

Total size:0

  • +

This helps to more precisely match your inquiry with potential suppliers.Use "," or "enter" to separate multiple keywords.

Please fill in all required fields.


    Loading ...

    Small Order Recommendation

    Loading ...