The Ideal Cloud Partner: Acer eDC
In today's rapidly evolving digital landscape, DDoS (Distributed Denial of Service) attacks have quickly become a formidable challenge for businesses. These attacks use massive volumes of abnormal traffic to overwhelm target servers or websites, preventing user access and leading to business interruptions as well as reputational damage. To address this threat, Acer eDC (Acer e-Enabling Data Center Inc.) has joined forces with SkyCloud Computing as a strategic partner to launch the "iTW Taiwan DDoS Protection Project." Through comprehensive monitoring, robust support, and intelligent detection mechanisms, our solution effectively defends against various types of DDoS and CC attacks, ensuring the security of your enterprise network.we welcome your inquiries.

Solution Overview

Our service leverages globally deployed traffic scrubbing centers to provide comprehensive DDoS protection for your website. We are dedicated to building a world-class cloud defense system that effectively blocks attacks and ensures the stable operation of your business.。

DDoS

Features

mavis 2

  • Primary Large-Packet Traffic Scrubbing
    In collaboration with international upstream partners such as NTT, Softbank, and PCCW, we perform initial large-packet traffic scrubbing. This process swiftly filters out the majority of malicious traffic, establishing a robust first line of defense for your system.

  • Proprietary Precision Scrubbing Technology
    For the smaller packets that bypass the initial scrubbing, our proprietary second-layer traffic scrubbing technology conducts detailed inspections at the L3/L4 layers. Additionally, it effectively handles certain CC attacks at the L7 layer, further enhancing overall traffic security.

  • Final Scrubbing via Web Application Firewall (WAF)
    Any residual traffic is processed through our Web Application Firewall (WAF) at the L7 layer. This final scrubbing step ensures that only legitimate, secure traffic is allowed into your network system, giving you peace of mind.

Benefits

1. Traffic Scrubbing Technology

Our multi-layer scrubbing architecture accurately identifies and cleanses attack traffic at the L3/L4 and L7 layers, effectively defending against large-scale DDoS attacks and ensuring robust network security.

2. Traffic Monitoring and Analysis

With our proprietary monitoring platform, we continuously track network traffic and automatically analyze anomalies, swiftly detecting and mitigating attacks to guarantee stable network operations.

3.Decentralized Architecture Design

Our decentralized defense approach, enabled by globally distributed scrubbing nodes, allows for immediate traffic cleansing near the source of an attack. This design reduces latency issues, significantly enhances scrubbing efficiency, and further secures network stability.

Key Features

mavis 3

  • Traffic Signature Identification
    Utilizing an extensive database of attack samples, we build malicious traffic signature models that rapidly identify and filter abnormal traffic, providing a strong first line of defense.

  • Protocol Feature Analysis
    By monitoring anomalies in protocol usage, we can promptly identify and intercept packets that do not conform to standard protocol norms, effectively mitigating attack behaviors.

  • Behavioral Analysis
    We conduct in-depth analyses of traffic behavior to recognize abnormal access patterns and attack signatures—such as unusual request frequencies and atypical access paths—thereby preempting potential threats.

  • Blacklist and Whitelist Management
    We block known malicious IP addresses and domains using blacklists, while whitelists ensure that trusted traffic is allowed through. This approach reduces false positives and enhances the precision of traffic management.

  • Intelligent Traffic Rate Limiting
    For abnormally high-frequency requests, our intelligent rate limiting strategy is implemented to prevent flood attacks from impacting service stability, ensuring continuous business operations.