An emulated DDoS attack reveals the level of your cyber resilience. It shows the bottlenecks in your network, your recovery capability and the gaps in your procedures.
A simulated attack is a controlled way of testing how you can handle an attack. You can test where the limits of your actual DDoS protection are and whether your intrusion detection and protection provider keeps its promises. It also allows you to test recovery procedures after an attack has crashed the system. Testing allows you to find the gaps in your protection before you need it.
With our flexible tool Ruge, you can hit your system with enormous amount of malicious traffic.
DDoS attack generation
Our tool, Ruge, can generate realistic DDoS attacks, so you can test your defences before deployment.
A simulated attack is created by mimicking attack traffic created by millions of attack sources, such as the endpoints in a botnet. It is possible to combine the attack with a typical traffic load, making the attack as real as possible.
Our solution enables tailoring the attack to target your vulnerabilities. You can craft an attack scenario based on your system and your needs, to match any scenario, even those in early stages of development.
Check our case study how we tested the defences on a live network with an emulated attack.
A real DDoS attack consists of traffic coming from a vast botnet, all directed at a single target. The emulated attack simulates this by generating a large amount of traffic, comparable to a real attack. This traffic is created to appear to be coming from multiple IPs. To make the scenario even more real, a bottom line typical traffic can be run at the same time as the attacks.
Read more on what are DDoS attacks and how they are created in real life.
Our IP load generator Ruge is a flexible tool for creating high amounts of network traffic. Here's how it works:
Creating your scenario
1. Select a reference message
You can select any message that is relevant in your system. This allows you to select a specific message even from a system that is still under development.
2. Defining the variables
In a real attack, the messages come from a number of sources and vary in many ways. Defining the variables allows you to emulate a wide range of sources and message contents.
3. Create the attack
By multiplying the messages while incrementing the variables, an attack with variable content is created. The attack can be controlled in detail to get detailed and repeatable results that enable focused action.
The tool used in our solution is our powerful Rugged IP load generator Ruge. It provides you with the options of either selecting the attacks from a library or crafting the scenarios yourself. Our library includes a wide range of attacks, including specifically targeted attacks for base stations and VoIP.
Read more on Ruge capabilities.
CHECK THE DATASHEET for more details on the tool.