DDoS has been the main principle for the information resources attacks for quite a long time. With this kind of attack, many working stations send requests to the server under attack simultaneously.
As a result of the attack it does not handle the load and can not function normally for a long time. Server equipment stops treating requests of real users, even completely stops its services.
Such an attack on a server can take quite a long time during which the owner of the resource looses users and clients thus having losses and reputation damage. It is no less interesting that your computer can take an immediate participation in DDoS attack without any suspicions coming from your side — such way of work is used by botnets.
As a direct impact DDoS attack is not a method of data theft and can not lead to a information leak provided that it is not used as a “shield” for potential penetration into the system. Thus any owner of a web-site earlier or later faces a task to study the system behavior at high loads.
Aims of stress testing (DDoS):
Possible variants of performed DDoS attacks when performing complex testing: