![]() ![]() Protection mechanisms are often in place but rarely ever properly tested. In such cases, you will want to do such an exercise to find out which protection mechanisms actually work. ![]() ![]() It is often a matter of a hybrid approach with some things being better protected than others. Either that, or they will rely on technologies that are able to withstand such attacks. In many cases where service availability is critical, organisations will have some form of protection mechanism. How bad does it get? A DDoS simulation exercise will give you an answer. If no security protection is in place for DoS, then you might want to see how dangerous this is for your particular business. The exercise that we are about to describe might be an important part of the answer to the question: what if we got attacked? The aim is to create a system that can, within reasonable effort, withstand most attacks that might be launched against your business. Seriously though, the real reason tends to be that of finding out how your critical services are going to react during a DDoS attack. The answer surely has to be that this is a great way to have some dangerous fun! It is indeed an entertaining thing to do and can lead to some interesting and often unexpected results. Why would you want to attack your own services? The video can be watched on Youtube, and the slides are also available here. If you would rather watch a presentation or go through the slides, we gave a talk on this very topic at TADSummit 2023 in Portugal. Even if in this article we do not really focus on the defensive side of protecting against DoS, ultimately the goal is to design and implement solutions that actually work for the systems and applications that need to be protected. But the instructions and ideas outlined in this text will apply to any system in general that you might need to test. We focus on attacking real-time communications systems because this is an area where DoS attacks can really cause damage. In this post, we give an overview of how you too can perform your own distributed denial of service (DDoS) simulation exercises. Follow the best practices, apply solutions and mitigation and you can finally answer: what if we got attacked? Introduction Understand the reasons why you would want to do this, then combine custom with off-the-shelf attack tools. A DDoS simulation is a practical exercise that various organisations are capable of doing. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |