DDoS has been the main principle for the information resources attacks for quite a long time. With this kind of attack, many working stations send requests to the server under attack simultaneously.

As a result of the attack it does not handle the load and can not function normally for a long time. Server equipment stops treating requests of real users, even completely stops its services.

Such an attack on a server can take quite a long time during which the owner of the resource looses users and clients thus having losses and reputation damage. It is no less interesting that your computer can take an immediate participation in DDoS attack without any suspicions coming from your side — such way of work is used by botnets.

As a direct impact DDoS attack is not a method of data theft and can not lead to a information leak provided that it is not used as a “shield” for potential penetration into the system. Thus any owner of a web-site earlier or later faces a task to study the system behavior at high loads.

Aims of stress testing (DDoS):

  • identification of the limit values of load for external web-services;
  • testing of stability of external web-services to the distribution attacks aimed at the service refusal;
  • evaluation of efficiency of existing protection methods against DDoS-attacks and interaction of IT-services of the Customer in terms of their revealing and blocking;
  • development of recommendation measures to increase the protection of information system from DDoS attacks.

Possible variants of performed DDoS attacks when performing complex testing:

  • HTTP-flood;
  • ICMP-flood;
  • SYN-flood;
  • Application-flood.

Submit application