?
Solved

Simulate a DDOS attack

Posted on 2013-01-30
5
Medium Priority
?
381 Views
Last Modified: 2013-02-17
Hi,
I'd like to simulate a DDOS attack for a college project (and to improve my own knowledge of the management/prevention of same) on a dummy home made network, can anyone suggest resources where I'd find details on how to do same please?
0
Comment
Question by:t38
  • 3
  • 2
5 Comments
 
LVL 41

Accepted Solution

by:
Kyle Abrahams earned 2000 total points
ID: 38837017
0
 

Author Comment

by:t38
ID: 38837297
Thanks for your prompt response, I'll review same and report back shortly
0
 

Author Comment

by:t38
ID: 38839204
ged325 - thanks again for those links, although they're helpful I was looking for more information rather than threads to forums so I'm going to leave the question open for a few days and see if I can obtain further detail.
0
 
LVL 41

Expert Comment

by:Kyle Abrahams
ID: 38841084
What information would you like?  Bees simulates the DDOS which achieves your goal no?
0
 

Author Closing Comment

by:t38
ID: 38898358
Thanks for your help!
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
2017 was a scary year for cyber security.  Hear what our security experts say that hackers have in store for us in 2018.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

612 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question