A DDoS test, also called a 'DDoS penetration test' or 'DDoS simulation', is an activity in which an organization launches various DDoS attacks against its own assets to check its actual resiliency.
The test allows for the identification of weak points, provides proof of them and increases the protection level. The attacks are usually conducted in a controlled and secured manner and their vectors are launched from a legitimate botnet. A typical attack will include half a dozen attack vectors, while a prolonged attack may double this.
A typical DDoS test will include the following attack vectors:
Volumetric DDOS attacks
Include multi-gigabit attack traffic from multiple global locations, testing the ability to withstand extreme and sustained throughput, connection and packets loads. The system applies the same load patterns as attackers do, such as large UDP packets and SYN flooding.
Application layer DDOS attacks
These attacks overwhelm the web server tier, generating excessive HTTP/S GET or POST requests.
Attackers can create extremely effective attacks using very low resources, such as 'Slowloris', 'R.U.D.Y' and 'SSL Renegotiation'.
There are multiple DDoS test providers. Some provide the attacks as part of their full service and some provide a self-service DDoS simulation platform which the customer can reuse.
Here are some of our advantages:
ARE YOU READY ?
Answer seven online questions and get a free report assessing your protection status with recommendations for improvement