Mitigativ

FREQUENTLY ASKED QUESTIONS

SOME COMMON QUESTIONS

Cyberdefense is a hypothetical perfection and a critical concept that organizations must address continuously. For instance, unrealistic assumptions, task procrastination, or erroneous actions can trigger unpredictable consequences. Some might not be visible to assess; others may be excessively expensive to manage, and some could be particularly challenging to mitigate.

Moreover, a new vulnerability arises every moment, creating spontaneous risks for organizations’ cyber defense strategies. However, Distributed Denial of Service (DDoS) attacks pose a continuous and serious threat to organizations, as they can strike at any time.

Therefore, we offer a DDoS and Load Test simulation service, LoDDoS, to enhance insights and control over your cyber defense. It acts as a magic bullet for organizations to regularly take a snapshot of their current resiliency to remain sturdy.

The following is a set of answers to common questions about this platform.

Should you require any additional information or answers to questions not addressed here, please Contact Us.

LoDDoS is a platform designed to help organizations proactively evaluate and strengthen their cyber defenses against DDoS attacks by providing DDoS and Load Testing simulation services.

 

The Chief Engineer, Founder, and CEO of LoDDoS are leading the innovation, whose vision and expertise have played a crucial role in shaping the platform.

 

From the beginning, LoDDoS has focused on advancing DDoS simulation technology, with a strong dedication to research and development in the realm of DDoS attack mitigation.

LoDDoS has a diverse and distributed B2B portfolio across the globe. As has been noted, almost half of LoDDoS customers are partners and resellers.

 

In the territory of the United States, Mitigativ LLC is the authorized distributor of LoDDoS.

 

Kindly navigate to our Partners page to commence the process of establishing a mutually beneficial partnership.

In essence, LoDDoS is a powerful platform to deploy up to 3,000 bots to conduct an extensive DDoS test with a wide range of attack simulations, allowing small to large-scale service disruptions.

 

However, for any scenario requiring a larger deployment, please contact us.

In short, there are more than 100 DDoS attacks supported on our platform. However, the following list comprises the most frequently requested attack simulations by the customers;

 

ICMP Flood
UDP Flood
Fragmented UDP Flood
SYN Flood
SYN-ACK Flood
ACK-FIN Flood
RST Flood
PUSHACK Flood
Empty Connection Flood
Slow Loris
Ping Of Death
ALL TCP Flags Flood
HTTTP/S GET
HTTP/S POST
DNS Query Flood
DNS Random Query Flood
SSL Negotiation Flood
RUDY
SSLSQUEEZE

LoDDoS provides the customer with control and flexibility in scheduling and managing tests. So, the customer can directly initiate the test. On the other hand, LoDDoS also provides training to its partners. So, an authorized contractor can also conduct the test on the customer's behalf.

 

This two-pronged approach guarantees that LoDDoS can effectively support the DDoS resilience efforts of the clients, catering to those who prefer a more autonomous testing experience or seek the expertise of a specialized contractor.

LoDDoS tracks system response time by sending valid requests to the target system through a secondary bot during testing. The monitoring process, on the other hand,  currently includes TCP connection, DNS request, HTTP/S GET/POST requests, and ECHO requests.

At LoDDoS, our utmost priority lies in upholding ethical standards and adhering to legal compliance. Consequently, we meticulously craft our services to enable users to exclusively perform tests on systems that they either own or possess explicit authorization to test.

 

Correspondingly, to ensure this safeguard, we have implemented a rigorous contractual agreement before any testing activities commence.

LoDDoS has integrated a failsafe mechanism into its DDoS testing process to ensure control and safety. Consequently, with just the push of a button, any test can be halted promptly.

The amount of bandwidth assigned to individual bots can vary significantly depending on the specific characteristics of the attack being simulated. More precisely, each bot can have a bandwidth allocation ranging from 40 Mbps to 80 Mbps.

LoDDoS is committed to providing you with the flexibility you need. In other words, we offer various upgrade options to ensure that our services can meet your evolving requirements.

 

So, if you decide that a higher-tier package would better suit your needs, upgrading is a simple process.

 

Please contact us at No text to expressNo text to expressNo text to express

Our commitment to ethical considerations and legal compliance is paramount at LoDDoS. We strictly adhere to these principles by conducting DDoS testing solely on systems that possess explicit ownership or authorized consent.

 

Shortly, a contractual agreement is a prerequisite before any testing can take place, ensuring the enforcement of this policy.

In LoDDoS tests, the distribution density of bots is strategically crafted to mimic real DDoS scenarios as accurately as possible. Additionally, this distribution is predominantly dictated by the maximum number of bots that can be deployed in specific regions.

 

In summary, by fine-tuning the spawning capacity to align with regional capabilities and test requirements, LoDDoS establishes a versatile and authentic testing environment for the cyber defense of your organization.

Undoubtedly, LoDDoS provides users with the flexibility to customize their DDoS testing scenarios by selecting specific regions to include or exclude bots.

Another key point, all packages bought from LoDDoS now include a 1-year validity period starting from the purchase date. Thus, our clients can effectively plan and carry out their DDoS testing strategies with ample time. The flexibility provided by the extended validity period enables clients to schedule tests based on their organizational requirements and timelines.

LoDDoS is equipped to perform mixed attacks, which involve executing two separate DDoS attack vectors simultaneously. This is an essential capability to mimic intricate real-world DDoS attack scenarios enabling a thorough assessment of a system’s resilience.

 

Launching an HTTP/S GET request attack alongside a TCP Flood attack on the specified target can be demonstrated to illustrate a mixed attack strategy.

The utilization of LoDDoS enables the swift and efficient generation of a thorough report. Hence, it guarantees clients immediate access to detailed outcomes of your organization's cyber defense once the DDoS test is completed.

LoDDoS employs an exhaustive and immediate reporting system that delivers test results customized for the specific details of each DDoS test executed.

 

For the best and most accurate representation of the nature and outcomes of the specific DDoS tests conducted, the reports slightly differ from each other, and each report encompasses crucial information, including;

 

  • Confirmation of test execution,
  • The identity of the test operator,
  • The bandwidth utilized during the test,
  • The usage of Packets per Second (PPS) if applicable,
  • The response time of the target system.

Particularly, all this information is graphically represented ensuring an intuitive and clear understanding of the test's impact and outcomes.

 

For versatility purposes such as convenience and documentation, any report generated by LoDDoS can be effortlessly exported to PDF format, facilitating the distribution, review, and archiving.

In essence, the DDoS Resiliency Score represents an empirical measurement indicating the duration a target can withstand tests, showcasing its resistance against DDoS attacks. Ranging from 1 to 10, higher values suggest increased resilience.

 

Furthermore, this score is calculated by comparing the response times before and during the tests, allowing for analysis and adjustment of defense mechanisms.

 

So, when the tests are repeated, the comparison of the scores with the previous one can be quite resourceful and the trend can be analyzed through fine-tuning the defense mechanism of the organization.

By leveraging the API offered by the cloud service provider, the LoDDoS Manager component takes charge of the botnet. Therefore, it enables the manager to create, configure, launch, and terminate individual bots. A distinct orchestration and configuration tool has been created to handle these operations, functioning behind the manager.

LoDDoS is fully equipped to carry out simulated DDoS attacks and load testing, providing a comprehensive suite of services to assess the resilience and performance of systems.

 

Thus, this approach guarantees a holistic understanding of a system's operational capabilities under both normal and adverse conditions.

While numerous trustworthy online resources provide insights into modern DDoS threats, you may begin your exploration with the following documents for further information;

 

Scroll to Top