In BTPSEC, our consultants have years of experience in analysis, simulation and mitigation of Ddos attacks. We believe that pre-testing your applications against all possible ddos attacks will provide the most accurate evaluation of your ddos protection systems/services.
Ddos means distributed denial of service. Ddos attacks are distributed denial of service attacks that uses multiple and intense resources (bandwidth) usually against a single resource (usually a service) in order to make the resource unresponsive to legal requests.
There are two types of approaches for information security today. Proactive approach is usually preferred.
Penetration testing (pentest) and vulnerability scanning (vulnerability assessment) issues are the most important parts of proactive security. Ddos and load tests are also considered in this context. All tests help critically towards business continuity.
Confidentiality, Integrity and Availability are the three most important terms we use for security. Ddos attacks are targeting the availability of the resources and availability is one of the most important points in cyber security.
The focus of the Ddos test is important and can be determined only after a clear understanding of the customer’s position in the market and its requirements.
Basically there are two types of ddos tests depending on the purpose. Our test either targets the bandwidth saturation (usually causes denial of internet services) or denial of a specific network or application.
Most targeted services in a ddos test are:
- DNS
- Media Services
- Games
- Web services
- Mobile
- Bandwidth
DNS (Domain Name System) is responsible for the conversion of domain names to IP addresses . DNS is a very critical component for operation of systems that are connected to the internet.
Typical DDOS tests include following:
- UDP Flood
- DNS Query flood
- DNS Response flood
- DNS cache poisoning
- DNS Amplification
- TCP floods: Syn, syn-ack, ack flood
- TCP fragment attacks
- Syn Reflection attack
- DNS Reflection attacks
- Http / Https post flood
- Http / Https get flood
- Mixed attack
- Voip attack
- Other protocol attacks