Column Control DTX

Quick Guide: Simulating A DDoS Attack in Your Own Lab

White Papers

DDoS attacks are a big risk to any business with an online presence. Even a basic test of a DDoS attack can help you discover critical data, including how many packets are dropped by your DDoS mitigation solution, how your mitigation solution actually functions in a real attack, what level of service you are able to provide while under attack, and how your people and process react to and withstand an attack.

 

In this guide we present three options for simulating a DDoS attack in your own lab:

  • Tier 1—Simulating a basic attack using open-source software and readily available computing resources
  • Tier 2—Simulating a more complex single-link attack using professional network testing software—Ixia Breaking Point Virtual Edition
  • Tier 3—Simulating a high-speed, multi-site attack between 10 Gbps and 960 Gbps using Ixia’s PerfectStorm hardware, which can simulate traffic from up to millions of attacking computers

×

Please have a salesperson contact me.

*Indicates required field

Preferred method of communication? *Required Field
Preferred method of communication? Change email?
Preferred method of communication?

By clicking the button, you are providing Keysight with your personal data. See the Keysight Privacy Statement for information on how we use this data.

Thank you.

A sales representative will contact you soon.

Column Control DTX