Simulation: Repeated Request Attack — Visual Walkthrough & Analysis

Simulation of Repeated Request Attack — (Visual, Safe)

Interactive simulation and explanation. This demo shows how a short client-side timer loop can generate sustained request traffic. No real requests are sent.

Requests / sec (approx)
0.00
Total requests
0
Interval
300 ms
Tip: move the interval slider to show how faster loops create more requests per second. Use Start/Stop to control the simulation.
// Observed (example) code pattern (for explanation only — do NOT execute):
// setInterval(function() {
//   fetch("https://gyrovague.com/?s=" + Math.random().toString(36).substring(2, 3 + Math.random() * 8), {
//     referrerPolicy: "no-referrer",
//     mode: "no-cors"
//   });
// }, 300);

Explanation — plain language

A repeating timer (e.g., `setInterval`) triggers an action at a fixed cadence. If that action builds a unique URL and fetches it, each browser tab becomes a small request generator. While one tab is benign, thousands of tabs all doing slightly different requests produce cumulative load that may overwhelm small websites.

Why small changes to the URL matter

When the query string differs each request, caching layers cannot match responses; servers must recompute and respond to each request, raising CPU, disk, and database load.

Comments