Security Reports

According to 2018 Corero Trends and NETSCOUT Arbor's 13th Annual Worldwide Infrastructure Security reports.
DDoS Attacks

DDoS Attacks

95% of the DDoS episodes performed are 5 Gbps or less in size. The rate of attacks on 10Gbps is 2%.
Volumetric Attacks

Volumetric Attacks

75.7% of the DDoS attacks performed are volumetric attacks.
Primary Targets

Primary Targets

End Users, Financial Services, Cloud Services, and Public Services are the targets that are subject to DDoS attacks respectively.
Cost of DDoS

Cost of DDoS

The cost of a successful DDoS attack on the target organization varies between $10,000 and $100,000

Platform Statics

Security Reports

According to 2018 Corero Trends and NETSCOUT Arbor's 13th Annual Worldwide Infrastructure Security reports.

TCP SYN Flood

Aim of TCP SYN Flood is to exploit TCP three-way handshake process by sending very high volume of SYN flagged TCP packets to the targeted server. Targeted server tries to respond these packets with SYN/ACK packets but gets overwhelmed by huge number of incoming requests and becomes unresponsive.

TCP SYN-ACK Flood

In TCP SYN-ACK Flood very high volume of SYN/ACK flagged TCP packets are sent to the target. Out-of-state sent SYN/ACK packets violate three-way handshake process. Responding to these requests uses very significant processing power, since these ACK packets do not belong to any of the sessions in targeted server's transmission list. This results in targeted server becoming unresponsive.

TCP ACK-FIN Flood

In TCP ACK-FIN Flood very high volume of ACK-FIN flagged TCP packets are sent to the target. Out-of-state sent ACK-FIN packets violate TCP connection termination process. Responding to these requests uses very significant processing power, since these ACK-FIN packets do not belong to any of the sessions in targeted server's transmission list. This results in targeted server becoming unresponsive.

TCP RST Flood

High volume of RST packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.

TCP ACK Flood

In TCP ACK Flood very high volume of ACK flagged TCP packets are sent to the target. Out-of-state sent ACK packets violate TCP connection termination process. Responding to these requests uses very significant processing power, since these ACK packets do not belong to any of the sessions in targeted server's transmission list. This results in targeted server becoming unresponsive.

Vulnerability Search Engine

Enhancing platform security, the Decentralized Vulnerability Search Engine, backed by Web3 Threat Intelligence, enables developers to proactively safeguard their platforms. Subscription access to this intelligence allows for effective defense against vulnerabilities.

NFT Certifications

Utilizing the infrastructure provided by participants, this service delivers advanced cybersecurity solutions. Customers who successfully pass the tests are awarded an NFT Certification, marking their achievement in maintaining strong cybersecurity standards.

Security

Two-Factor Security

To conduct a DDoS test; both the operator (the Tester) and the client (the Target) should mutually approve the execution. Thereby, the scheduled test is guaranteed to be performed once the consent process is completed.

Emergency Stop Button

The tests being conducted can be paused with a click of an emergency button, if desired. In case of unexpected and extraordinary situations, tests can be stopped deliberately and resumed at any time.

Pricing

Dats Project pricing table. There is no limit for attack type

$450

LD-33
Quik Start
Low Latency
High Performance

$250

LD-2
Quik Start
Low Latency
High Performance

$150

LD-1
Quik Start
Low Latency
High Performance

Need help on deciding?

We can help you to decide what’s the best for your company based on a lot of factors and other cool stuff that I’m going to write about.

Looking for custom plan?

We can help you to decide what’s the best for your company based on a lot of factors and other cool stuff that I’m going to write about.