Security Reports
According to 2018 Corero Trends and NETSCOUT Arbor's 13th Annual Worldwide Infrastructure Security reports.
What is LoDDoS?
LoDDoS is a cloud-based DDoS Testing platform offered as software as a service (SaaS) model.
With LoDDoS, organizations can easily test the limits and capabilities of information technology infrastructures, DDoS mitigation systems/services, and incident response mechanisms without being exposed to a real malicious DDoS attack but by a self-initiated controlled one.
The tests defined on LoDDoS can be initiated with a single action, can be monitored live, can be stopped in a controlled manner, can be repeated as often as needed. Reports can be generated at the end of each test thus results can be shared with third parties.
At the end of each test, the DDoS Resiliency Score (DRS), which shows how resilient the target system is against the DDoS testing performed, is automatically calculated and mentioned in the report.
LoDDoS is a useful and effective DDoS testing platform for red and blue teams with various real life DDoS test types. Preparation stages that normally take a long time and require technical expertise in a manual DDoS test are carried out automatically by LoDDoS. Tests are carried out easily, DDoS mitigation systems/services, network and security devices, applications, incident detection, and response capabilities can be evaluated according to the test results.


Why To Perform DDos Tests?
Generally, DDoS tests are performed to measure the efficiency and limits of the DDoS prevention products and services, and to improve these systems, as well as to measure and improve the efficiency and capabilities of the organization in case of a DDoS attack.
DDoS prevention systems and products are not plug-and-play systems; Organization’s normal and abnormal network traffics, baselines and thresholds must be defined.
However, it is important that the devices and server systems in the organization’s network must be tested and the security specialists who manage DDoS prevention systems must experience the reaction of the systems before a real DDoS attack.
How To Perform DDos Tests?
Most DDoS tests are manually performed nowadays. The technical and administrative preparation stages of these tests take long. Security and IT teams must work together to prepare and configure the systems to perform DDoS tests. Performance of these operations leads to additional load in terms of time and cost. Real-time monitoring is usually not available during the tests and it takes time to issue reports after the tests are completed.
Regardless of whether they are performed for once or regularly, the preparation of each test is started from the beginning.
Volumetric DDoS Tests
The main purpose of volumetric DDoS attacks is to consume network and system resources of target systems and to prevent users from serving these systems.
Mostly, it is intended to fill the line by sending packets at the top of the internet bandwidth of the target systems.
TCP SYN Flood
High volume of SYN packets is sent to a TCP service serving on the target system, preventing the corresponding TCP service from serving.
TCP SYN-ACK Flood
High volume of the SYN-ACK packets is sent to a TCP service serving on the target system, preventing the TCP service from serving.
TCP ACK-FIN Flood
High volume of ACK-FIN packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.
TCP RST Flood
High volume of RST packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.
TCP PUSH ACK Flood
High volume of PUSH ACK packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.
TCP All Flags Flood
High volume of full-flagged TCP packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.
TCP No Flags Flood
High volume of none-flagged TCP packets is sent to a TCP service serving on the target system to prevent the corresponding TCP service from serving.
UDP Flood
High volume of UDP packets is sent to a UDP service serving on the target system to prevent the UDP service from serving.
UDP Fragmented Flood
High volume of fragmented UDP packets is sent to a UDP service serving on the target system and the UDP service is prevented fromserving.
ICMP Flood
High volume of ICMP packets is sent to the target systems for testing.
SSL Negotiation Flood
High number of SSL/TLS handshakes are sent to an SSL/TLS service serving on the target system to prevent the service from serving
DDoS Tests in Application Layer
The aim of the DDOS tests performed on the application layer is to open valid and real connections on the target systems and to force the limits of the systems and prevent them from serving.
HTTP GET
High number of GET requests is sent to a HTTP service serving on the target system to prevent the service from serving.
HTTP POST
High number of POST requests is sent to an HTTP service serving on the target system to prevent the service from serving.
HTTPS GET
High number of GET requests are sent to an HTTPS service serving on the target system to prevent the service from serving.
HTTPS POST
High number of POST requests are sent to an HTTPS service serving on the target system to prevent the service from serving.
Slowloris
A connection to an HTTP or HTTPS service serving the target system is established so that the connection remains open as long as possible. Thus, service is tried to be prevented. Slowloris is an effective attack on Apache web servers.
DNS Query
High number DNS requests is sent to a DNS service that serves on the target system, preventing the corresponding DNS service from serving.
DNS Random Query Flood
High number of random DNS requests are sent to a random DNS service that serves on the target system, preventing the corresponding DNS service from serving.
Test Volumes
# Bots | L3/4 Tests (Volumetric) Bandwidth Mbps (upto) | L7 Tests (Application) Running User (upto) |
---|---|---|
50 | 3.000 | 500.000 |
200 | 12.000 | 2.000.000 |
400 | 24.000 | 4.000.000 |
600 | 36.000 | 6.000.000 |
Security
Two-Factor Security
To perform a DDoS test; both the operator (the tester) and the customer (tested) must approve the relevant test. In this way, the test is only guaranteed to the party who wants to take the test.
Emergency Stop Button
The tests being performed can be stopped by one-touch if desired. In case of unexpected situations, tests can be stopped deliberately and restarted at any time.
Security
In order to prevent abuse and misuse of LoDDoS, LoDDoS provider has to take some precautions before tests.
Depending on the type of tests performed, the customer's target information (FQDN, URL and IP address), attack types, bandwidth must be acquired by LoDDoS provider in order to perform tests effective, safe and secure.
The customer must prove the target information which is submitted is belongs to them before tests performed.
Pricing & Buy
Are You Ready for DDoS Attack? Measure with LoDDoS!
$895/1 Hour
- LD-50
- 50 bots
- 60 mins
- up to 3000 Mbps
- Operator Support
$1045/1 Hour
- LD-200
- 200 bots
- 60 mins
- up to 12000 Mbps
- Operator Support
$1135/1 Hour
- LD-400
- 400 bots
- 60 mins
- up to 24000 Mbps
- Operator Support
$1435/2 Hour
- LD-50
- 50 bots
- 120 mins
- up to 3000 Mbps
- Operator Support
$1879/3 Hour
- LD-50
- 50 bots
- 180 mins
- up to 3000 Mbps
- Operator Support
$2448/4 Hour
- LD-50
- 50 bots
- 240 mins
- up to 3000 Mbps
- Operator Support