Solved

Simulate a DDOS attack

Posted on 2013-01-30
5
371 Views
Last Modified: 2013-02-17
Hi,
I'd like to simulate a DDOS attack for a college project (and to improve my own knowledge of the management/prevention of same) on a dummy home made network, can anyone suggest resources where I'd find details on how to do same please?
0
Comment
Question by:t38
  • 3
  • 2
5 Comments
 
LVL 40

Accepted Solution

by:
Kyle Abrahams earned 500 total points
ID: 38837017
0
 

Author Comment

by:t38
ID: 38837297
Thanks for your prompt response, I'll review same and report back shortly
0
 

Author Comment

by:t38
ID: 38839204
ged325 - thanks again for those links, although they're helpful I was looking for more information rather than threads to forums so I'm going to leave the question open for a few days and see if I can obtain further detail.
0
 
LVL 40

Expert Comment

by:Kyle Abrahams
ID: 38841084
What information would you like?  Bees simulates the DDOS which achieves your goal no?
0
 

Author Closing Comment

by:t38
ID: 38898358
Thanks for your help!
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco ACS re-imaging with CIMC 2 65
Google Play app store not being blocked from smartphones 4 53
Office 365 Login Audit Report 1 36
local DNS vendor. 4 62
There are some basic methods for preventing attacks on, hacking of and unauthorized access to a network -- maybe not completely, but up to a certain level. Start with a well-reputed firewall and unified threat management (UTM) system -- a gateway…
There is a question posted at http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Windows_Server_2008/Q_28324159.html (http://www.experts-exchange.com/OS/Microsoft_Operating_Systems/Server/Windows_Server_2008/Q_28324159.html) and i…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question