Tailoring DDoS Simulation to Suit a Multinational Company’s Architecture

A multinational company, specializing in digital automation and energy management, approached us to evaluate the efficiency and effectiveness of their existing infrastructure and protection measures against DDoS attacks.

The company uses Azure cloud services, including, Azure DDoS Protection.

However, the company uses a specialized HTTPS-based protocol that utilizes mTLS certificate validation and wanted to know whether an attacker would be able to exploit this to generate a DDoS attack.

The Solution

The Red Button team carefully analyzed the company’s cloud architecture, we planned and executed multiple attack vectors, including volumetric, protocol, and application layer attacks, to stress and identify weak points in the existing protection.

The Results

Five of the six attack scenarios were fully mitigated by the Azure DDoS Protection service without impacting the company’s services.

However, the application-level attack scenario was neither detected nor mitigated, and it caused an immediate downtime to one of the company’s services. This deficiency could pose a significant, costly threat to the global organization’s business continuity.


To address the identified protection gaps, Red Button provided the following recommendations:

  • Improve traffic capacity: Our simulation revealed the system’s inability to handle a relatively small amount of traffic. We advised modifying the hardware, software, and configuration of the service to support larger traffic volumes.
  • Configure rate-limit-based rules: To prevent users from submitting a large number of HTTPS requests, we recommended defining rate-limit rules in the WAF as an additional protection measure. Rules should be defined based on the typical expected behavior, with a threshold that is high enough to block malicious users and low enough to prevent false positives.
  • Apply geo-protection at the network layer The existing protection solution settings exposed the company to network-layer attacks originating outside the location of its intended North American user-base. To limit this risk, we recommended tweaking the WAF settings to include geo-blocking, as well as setting geo-protection rules in Azure’s network security groups to prevent layer 3-4 attacks.

Read Other
Case Studies

Check out these resources for more information
about our DDoS testing solutons for your business.