End-to-End Solutions to Empower Your Business

Port Mirror
The port mirror adapter on the relevant sensor is activated via the ASMA Central Management Component interface. Then, the mirror port traffic received from a central network device deemed appropriate for asset detection is directed to the relevant sensor. From the moment the traffic starts to arrive, IP assets and TCP services on these assets are discovered depending on the data passing through the port mirror.

Netflow
The Netflow adapter on the relevant sensor is activated via the ASMA Central Management Component interface. Then, the Netflow traffic is directed to the Sensor IP address via a central network device deemed appropriate for asset detection. Based on the data in the incoming Netflow packets, IP entities and TCP services on these entities are discovered.

VMware
The VMware adapter on the relevant sensor is activated via the ASMA Central Management component interface and VMware user information is entered. The ASMA sensor connects to the VMware server and retrieves information about all active ‘Guest’ and ‘Host’ machines with IP addresses and sends it to the Central Management component.

Microsoft Active Directory
The Active Directory adapter on the relevant sensor is activated via the ASMA Central Management component interface and Active Directory user information is entered. The ASMA sensor connects to the Active Directory server and retrieves information about all machines in the directory and sends it to the Central Management component.

Microsoft DHCP
The Microsoft DHCP adapter on the relevant sensor is activated via the ASMA Central Management component interface and the necessary information is entered to access the Microsoft DHCP log file. The ASMA sensor reads the DHCP file it accesses, retrieves information about the IP addresses distributed by the DHCP server and sends it to the Central Management component.

DNS Server
The DNS records of the entities discovered with all adapters are detected with this adapter without any additional adjustments and enriched with DNS information.

Active – Passive Asset Discovery
Detects IT assets in real time through sensors positioned on network segments.

New Asset Detection
Immediately detects when an asset that is not in your network inventory appears.

New Service Detection
Detects when a service occurs on your assets.

Service Change Detection
Detects service changes on assets in your network.

IP Address Change Detection
Detects IP address changes on your assets.

MAC Address Change Detection
Detects MAC address changes on your assets.

Asset-Based Correlational Anomaly Detection
Detects security anomalies on your assets with predefined correlation rules.

Thanks to LoDDoS, organizations are exposed to a real but controlled DDoS attack that is not initiated by the attackers, but initiated and managed by themselves. Thus, they can easily test the limits and capabilities of their information technology infrastructures, DDoS protection systems/services and incident response mechanisms as desired.

Tests defined on LoDDoS can be started with a single move, monitored live and stopped in a controlled manner at any time thanks to its user-friendly interface. Tests can be repeated as often as desired, reports can be produced at the end of the test and shared with stakeholders.

At the end of each test, the DDoS Resiliency Score (DRS), which shows how resistant the target system is to the DDoS test performed, is automatically calculated and reflected in the report.

LoDDoS is a useful and effective DDoS test platform for red and blue teams. In manual DDoS tests, the DDOS test preparation stages, which take a long time and require technical expertise, are automatically performed by LoDDoS. Tests are easily performed, and according to the test results, DDoS protection systems/services, network and security devices, applications, incident detection and response capabilities can be evaluated for improvement.

LoDDoS Architecture
LoDDoS basically consists of 3 components.

LoDDoS is an automated DDoS testing platform that is managed through a web interface. The platform allows organizations to experience DDoS attacks using real attack parameters. LoDDoS includes:

  • Command Control Center
  • Bot Networks
  • System Monitoring

The Digital Operational Resilience Act (DORA)
Unlock DORA Compliance with LoDDoS!

LoDDoS plays a crucial role in helping organizations meet these compliance requirements by verifying their systems are resilient against cyber threats.

DDoS Attacks
The number of DDoS attacks grew 150% on a global basis compared to the previous year. More than half of the attacks were aimed at organizations in EMEA

Attacks by Layers
In 2022, 78% of DDoS attacks targeted the application layer of the OSI model, 17% hit the network and transport layers, and 3% targeted DNS.

Primary Targets
End Users, Financial Services, Cloud Services, and Public Services are the targets that are subject to DDoS attacks respectively.

Complexity
DDoS attacks continue to increase in complexity. Attackers typically leverage multiple and dissimilar vectors to increase the impact and make attack mitigation harder.

DDoS Attacks
The number of DDoS attacks grew 150% on a global basis compared to the previous year. More than half of the attacks were aimed at organizations in EMEA

Attacks by Layers
In 2022, 78% of DDoS attacks targeted the application layer of the OSI model, 17% hit the network and transport layers, and 3% targeted DNS.

Primary Targets
End Users, Financial Services, Cloud Services, and Public Services are the targets that are subject to DDoS attacks respectively.

Complexity
DDoS attacks continue to increase in complexity. Attackers typically leverage multiple and dissimilar vectors to increase the impact and make attack mitigation harder.Dedicated To Protect Your Business Against DDoS Attacks

LoDDoS is committed to deliver comprehensive and insightful results that enable businesses to operate smoothly without worrying about potential disruptions caused by cyber threats.

Instant Cloud Access
Direct cloud access by operator in case of network failure.

Attack Auto Time Out
Running attack vectors terminated automatically at the end of duration time and our botnet is able to finish each attack vector without any operator command if a connection issue takes place between CC and LoDDoS Manager system.

This enables organizations to test the limits and the efficiency of their existing DDoS prevention systems prior to an actual DDoS attack. The tests which are defined on LoDDoS, are conducted with he attendance of an Operator as well as can be initiated with a single action, monitored live, stopped in a controlled manner, repeated as often as needed. Reports can be generated automatically and promptly by the end of each test thus results can be shared with third parties, if requested.

DDoS test sessions in LoDDoS platform can be monitored in real-time by all parties and can be paused at any time in case of an emergency. All tests can be repeated, and the results can be compared. Reports are generated instantly and can be saved for later evaluation.

LoDDoS Autopilot’s Auto Run feature represents a significant advancement in DDoS testing, offering
unparalleled automation, reliability, and flexibility. By automating the initiation, execution, and
reporting of DDoS tests, while also allowing for manual intervention when necessary, it empowers
customers to conduct thorough assessments of their systems with minimal oversight, ensuring that
they can maintain robust defenses against DDoS attacks with maximum efficiency and control.

Boost Your Online Presence Today!