DDoS attack emulation

Can you handle a DDoS attack?


An emulated DDoS attack reveals the level of your cyber resilience. It shows the bottlenecks in your network, your recovery capability and the gaps in your procedures. 

A simulated attack is a controlled way of testing how you can handle an attack. You can test where the limits of your actual DDoS protection are and whether your intrusion detection and protection provider keeps its promises. It also allows you to test recovery procedures after an attack has crashed the system. Testing allows you to find the gaps in your protection before you need it. 

With our flexible tool Ruge, you can hit your system with enormous amount of malicious traffic. 




DDoS attack generation


Our tool, Ruge, can generate realistic DDoS attacks, so you can test your defences before deployment.   

A simulated attack is created by mimicking attack traffic created by millions of attack sources, such as the endpoints in a botnet. It is possible to combine the attack with a typical traffic load, making the attack as real as possible. 

Our solution enables tailoring the attack to target your vulnerabilities. You can craft an attack scenario based on your system and your needs, to match any scenario, even those in early stages of development. 


Check our case study how we tested the defences on a live network with an emulated attack. 



How does DDoS emulation work in practice?


A real DDoS attack consists of traffic coming from a vast botnet, all directed at a single target. The emulated attack simulates this by generating a large amount of traffic, comparable to a real attack. This traffic is created to appear to be coming from multiple IPs. To make the scenario even more real, a bottom line typical traffic can be run at the same time as the attacks. 


Read more on what are DDoS attacks and how they are created in real life. 


Our IP load generator Ruge is a flexible tool for creating high amounts of network traffic. Here's how it works:


Creating your scenario


1. Select a reference message

You can select any message that is relevant in your system. This allows you to select a specific message even from a system that is still under development. 


2. Defining the variables

In a real attack, the messages come from a number of sources and vary in many ways. Defining the variables allows you to emulate a wide range of sources and message contents. 


3. Create the attack

By multiplying the messages while incrementing the variables, an attack with variable content is created. The attack can be controlled in detail to get detailed and repeatable results that enable focused action.  



Creating an attack from the library

The tool used in our solution is our powerful Rugged IP load generator Ruge. It provides you with the options of either selecting the attacks from a library or crafting the scenarios yourself. Our library includes a wide range of attacks, including specifically targeted attacks for base stations and VoIP. 


The attack library includes for example these typical attacks:


  • TCP SYN flood attacks

  • UDP flood attacks

  • DNS flood attacks

  • Ping of Death

  • Ping flood

  • Smurf attack

  • ARP flood attacks

  • Teardrop attacks

  • TCP sequence prediction attack

  • Attacks with malformed or fragmented packets

  • TCP port scan attacks

  • etc..


Read more on Ruge capabilities.

  CHECK THE DATASHEET    for more details on the tool.

Or contact us at sales@ruggedtooling.com for more insight on DDoS testing.









Let's work out the right solution for you.
Request a trial use or more information.
If you'd like us to call you, leave us your phone number.


Subscribe to our mailing list

* indicates required