DDoS Simulation

How resilient is your online infrastructure against denial of service attacks?

"In the first quarter of 2019, the number of DDoS attacks increased by 84%, compared with Q4 2018."
Kaspersky Lab’s DDoS Q1 2019 report

 

Validating Service Resilience

A denial of service (DoS) attack is an attempt to make a resource unavailable to end users. A distributed denial of service (DDoS) attack leverages a large number of machines to achieve this goal. Attackers will use botnets, a collection of infected computers, etc. What are your company’s crown jewels, and are they adequately protected against these DDoS attacks? What is the impact on your organization when your service goes down for a minute, an hour, a day, or longer?

Getting consistent results

Building on our security intelligence capabilities, we’ve built a Splunk-based command-and-control platform with a library of standard and custom attacks that mimic real-world attack vectors. We create attack configurations, specifying details such as the number of bots and their geographic location. Also, we instantly spin up an attack environment. Using a structured approach provides a way to conduct a denial of service simulation in a fully controlled manner. It offers the advantages of ensuring that all tests are controlled, repeatable, and comprehensive.

DDoS Simulation - Beyond volumed based attacks

We evaluate your online environment against various applicative and volumetric DDoS attacks and assess the effectiveness of the security measures of your infrastructure while monitoring in real-time the impact on the target (traffic resulting from and latency caused by our attacks) from the perspective of the Internet. To achieve the best results, we will work in close collaboration with you to pinpoint the exact types of attacks that cause components in the environment to overload. We document and explain all conducted attack scenarios along with a precise timeline of all executed attacks, which you can use during post-mortem analysis. In addition, each attack vector is supported by a graph that outlines the correlation between time and the response time of the system under attack. Mitigation strategies and recommendations are offered to assist you in reducing the risk to the business.

What is the impact on your organization when your service goes down for a minute, an hour, a day, or longer? We evaluate your online environment against various applicative and volumetric DDoS attacks and assess the effectiveness of the security measures of your infrastructure. Measure your digital services’ resilience against applicative and volume-based distributed denial of service attacks.

Let's go for excellence

Contact us &

Let's talk

Don’t hesitate to contact us if you need more information, have a question or believe we can assist you in your quest for Digital Service Excellence.

I have read and agree with the privacy policy

"By leveraging cloud API, we can choose to spin up 10 machines or 10.000 machines. An attack platform is always ready in minutes, and a truly distributed attack scenario becomes possible."

Stephen C. - Davinsi Labs