Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Simulate a DDOS attack

Posted on 2013-01-30
5
Medium Priority
?
377 Views
Last Modified: 2013-02-17
Hi,
I'd like to simulate a DDOS attack for a college project (and to improve my own knowledge of the management/prevention of same) on a dummy home made network, can anyone suggest resources where I'd find details on how to do same please?
0
Comment
Question by:t38
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
5 Comments
 
LVL 40

Accepted Solution

by:
Kyle Abrahams earned 2000 total points
ID: 38837017
0
 

Author Comment

by:t38
ID: 38837297
Thanks for your prompt response, I'll review same and report back shortly
0
 

Author Comment

by:t38
ID: 38839204
ged325 - thanks again for those links, although they're helpful I was looking for more information rather than threads to forums so I'm going to leave the question open for a few days and see if I can obtain further detail.
0
 
LVL 40

Expert Comment

by:Kyle Abrahams
ID: 38841084
What information would you like?  Bees simulates the DDOS which achieves your goal no?
0
 

Author Closing Comment

by:t38
ID: 38898358
Thanks for your help!
0

Featured Post

What Is Blockchain Technology?

Blockchain is a technology that underpins the success of Bitcoin and other digital currencies, but it has uses far beyond finance. Learn how blockchain works and why it is proving disruptive to other areas of IT.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
In this article, we’ll look at how to deploy ProxySQL.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

721 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question