Solved

Simulate a DDOS attack

Posted on 2013-01-30
5
369 Views
Last Modified: 2013-02-17
Hi,
I'd like to simulate a DDOS attack for a college project (and to improve my own knowledge of the management/prevention of same) on a dummy home made network, can anyone suggest resources where I'd find details on how to do same please?
0
Comment
Question by:t38
  • 3
  • 2
5 Comments
 
LVL 40

Accepted Solution

by:
Kyle Abrahams earned 500 total points
ID: 38837017
0
 

Author Comment

by:t38
ID: 38837297
Thanks for your prompt response, I'll review same and report back shortly
0
 

Author Comment

by:t38
ID: 38839204
ged325 - thanks again for those links, although they're helpful I was looking for more information rather than threads to forums so I'm going to leave the question open for a few days and see if I can obtain further detail.
0
 
LVL 40

Expert Comment

by:Kyle Abrahams
ID: 38841084
What information would you like?  Bees simulates the DDOS which achieves your goal no?
0
 

Author Closing Comment

by:t38
ID: 38898358
Thanks for your help!
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are some basic methods for preventing attacks on, hacking of and unauthorized access to a network -- maybe not completely, but up to a certain level. Start with a well-reputed firewall and unified threat management (UTM) system -- a gateway…
A few customers have recently asked my thoughts on Password Managers.  As Security is a big part of our industry I was initially very hesitant and sceptical about giving a program all of my secret passwords.  But as I was getting asked about them mo…
A short film showing how OnPage and Connectwise integration works.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now