Security Reports

According to 2018 Corero Trends and NETSCOUT Arbor's 13th Annual Worldwide Infrastructure Security reports.

DDoS Attacks

95% of the DDoS attacks performed were of 5 Gbps or less. The rate of attacks on 10Gbps is 2%.

Volumetric Attacks

75.7% of the DDoS episodes were volumetric attacks.

Primary Targets

End-users, Financial Services, Cloud Services and Public Services are the primary targets exposed to DDoS attacks.

Cost of DDoS

The cost of a successful DDoS attack to the target organization ranges from $ 10,000 to $ 100,000.

What is LoDDoS?

LoDDoS is a cloud-based DDoS Testing platform offered as software as a service (SaaS) model.

With LoDDoS, organizations can easily test the limits and capabilities of information technology infrastructures, DDoS mitigation systems/services, and incident response mechanisms without being exposed to a real malicious DDoS attack but by a self-initiated controlled one.

The tests defined on LoDDoS can be initiated with a single action, can be monitored live, can be stopped in a controlled manner, can be repeated as often as needed. Reports can be generated at the end of each test thus results can be shared with third parties.

At the end of each test, the DDoS Resiliency Score (DRS), which shows how resilient the target system is against the DDoS testing performed, is automatically calculated and mentioned in the report.

LoDDoS is a useful and effective DDoS testing platform for red and blue teams with various real life DDoS test types. Preparation stages that normally take a long time and require technical expertise in a manual DDoS test are carried out automatically by LoDDoS. Tests are carried out easily, DDoS mitigation systems/services, network and security devices, applications, incident detection, and response capabilities can be evaluated according to the test results.

drive02drive02

Why To Perform DDos Tests?

Generally, DDoS tests are performed to measure the efficiency and limits of the DDoS prevention products and services, and to improve these systems, as well as to measure and improve the efficiency and capabilities of the organization in case of a DDoS attack.

DDoS prevention systems and products are not plug-and-play systems; Organization’s normal and abnormal network traffics, baselines and thresholds must be defined.

However, it is important that the devices and server systems in the organization’s network must be tested and the security specialists who manage DDoS prevention systems must experience the reaction of the systems before a real DDoS attack.

How To Perform DDos Tests?

Most DDoS tests are manually performed nowadays. The technical and administrative preparation stages of these tests take long. Security and IT teams must work together to prepare and configure the systems to perform DDoS tests. Performance of these operations leads to additional load in terms of time and cost. Real-time monitoring is usually not available during the tests and it takes time to issue reports after the tests are completed.

Regardless of whether they are performed for once or regularly, the preparation of each test is started from the beginning.

Volumetric DDoS Tests

The main purpose of volumetric DDoS attacks is to consume network and system resources of target systems and to prevent users from serving these systems.

Mostly, it is intended to fill the line by sending packets at the top of the internet bandwidth of the target systems.

TCP SYN Flood

High volume of SYN packets is sent to a TCP service serving on the target system, preventing the corresponding TCP service from serving.

TCP SYN-ACK Flood

High volume of the SYN-ACK packets is sent to a TCP service serving on the target system, preventing the TCP service from serving.

TCP ACK-FIN Flood

High volume of ACK-FIN packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.

TCP RST Flood

High volume of RST packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.

TCP PUSH ACK Flood

High volume of PUSH ACK packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.

TCP All Flags Flood

High volume of full-flagged TCP packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.

TCP No Flags Flood

High volume of none-flagged TCP packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.

UDP Flood

High volume of UDP packets is sent to a UDP service serving on the target system to prevent the UDP service from serving.

UDP Fragmented Flood

High volume of fragmented UDP packets is sent to a UDP service serving on the target system and the UDP service is prevented fromserving.

ICMP Flood

High volume of ICMP packets is sent to the target systems for testing.

SSL Negotiation Flood

High number of SSL/TLS handshakes are sent to an SSL/TLS service serving on the target system to prevent the service from serving

DDoS Tests in Application Layer

The aim of the DDOS tests performed on the application layer is to open valid and real connections on the target systems and to force the limits of the systems and prevent them from serving.

HTTP GET

High number of GET requests is sent to a HTTP service serving on the target system to prevent the service from serving.

HTTP POST

High number of POST requests is sent to an HTTP service serving on the target system to prevent the service from serving.

HTTPS GET

High number of GET requests are sent to an HTTPS service serving on the target system to prevent the service from serving.

HTTPS POST

High number of POST requests are sent to an HTTPS service serving on the target system to prevent the service from serving.

Slowloris

A connection to an HTTP or HTTPS service serving the target system is established so that the connection remains open as long as possible. Thus, service is tried to be prevented. Slowloris is an effective attack on Apache web servers.

DNS Query

High number DNS requests is sent to a DNS service that serves on the target system, preventing the corresponding DNS service from serving.

DNS Random Query Flood

High number of random DNS requests are sent to a random DNS service that serves on the target system, preventing the corresponding DNS service from serving.

Test Volumes

# BotsL3/4 Tests (Volumetric) Bandwidth Mbps (upto)L7 Tests (Application) Running User (upto)
503.000 500.000
20012.0002.000.000
40024.0004.000.000
60036.000 6.000.000

Security

Two-Factor Security
Two-Factor Security

To perform a DDoS test; both the operator (the tester) and the customer (tested) must approve the relevant test. In this way, the test is only guaranteed to the party who wants to take the test.

Emergency Stop Button
Emergency Stop Button

The tests being performed can be stopped by one-touch if desired. In case of unexpected situations, tests can be stopped deliberately and restarted at any time.

Security

In order to prevent abuse and misuse of LoDDoS, LoDDoS provider has to take some precautions before tests.

Depending on the type of tests performed, the customer's target information (FQDN, URL and IP address), attack types, bandwidth must be acquired by LoDDoS provider in order to perform tests effective, safe and secure.

The customer must prove the target information which is submitted is belongs to them before tests performed.

Pricing & Buy

Are You Ready for DDoS Attack? Measure with LoDDoS!

$895/1 Hour

  • LD-50
  • 50 bots
  • 60 mins
  • up to 3000 Mbps
  • Operator Support

$1045/1 Hour

  • LD-200
  • 200 bots
  • 60 mins
  • up to 12000 Mbps
  • Operator Support

$1135/1 Hour

  • LD-400
  • 400 bots
  • 60 mins
  • up to 24000 Mbps
  • Operator Support

$1435/2 Hour

  • LD-50
  • 50 bots
  • 120 mins
  • up to 3000 Mbps
  • Operator Support

$1879/3 Hour

  • LD-50
  • 50 bots
  • 180 mins
  • up to 3000 Mbps
  • Operator Support

$2448/4 Hour

  • LD-50
  • 50 bots
  • 240 mins
  • up to 3000 Mbps
  • Operator Support