Kaspersky Lab’s DDoS Q1 2019 report
Validating Service Resilience
A denial of service (DoS) attack is an attempt to make a resource unavailable to end users. A distributed denial of service (DDoS) attack leverages a large number of machines to achieve this goal. Attackers will use botnets, a collection of infected computers, etc. What are your company’s crown jewels, and are they adequately protected against these DDoS attacks? What is the impact on your organization when your service goes down for a minute, an hour, a day, or longer?
Getting consistent results
Building on our security intelligence capabilities, we’ve built a Splunk-based command-and-control platform with a library of standard and custom attacks that mimic real-world attack vectors. We create attack configurations, specifying details such as the number of bots and their geographic location. Also, we instantly spin up an attack environment. Using a structured approach provides a way to conduct a denial of service simulation in a fully controlled manner. It offers the advantages of ensuring that all tests are controlled, repeatable, and comprehensive.
DDoS Simulation - Beyond volumed based attacks
We evaluate your online environment against various applicative and volumetric DDoS attacks and assess the effectiveness of the security measures of your infrastructure while monitoring in real-time the impact on the target (traffic resulting from and latency caused by our attacks) from the perspective of the Internet. To achieve the best results, we will work in close collaboration with you to pinpoint the exact types of attacks that cause components in the environment to overload. We document and explain all conducted attack scenarios along with a precise timeline of all executed attacks, which you can use during post-mortem analysis. In addition, each attack vector is supported by a graph that outlines the correlation between time and the response time of the system under attack. Mitigation strategies and recommendations are offered to assist you in reducing the risk to the business.
Related services

Contact us &
Let's talk
Don’t hesitate to contact us if you need more information, have a question or believe we can assist you in your quest for Digital Service Excellence.

"By leveraging cloud API, we can choose to spin up 10 machines or 10.000 machines. An attack platform is always ready in minutes, and a truly distributed attack scenario becomes possible."
Stephen C. - Davinsi Labs