• To ensure you get the most out of your CIN membership and stay connected with the latest updates, we are asking all members to update their community profiles. Please take a few moments to log in and: • Complete all sections of your profile • Review your current information for accuracy • Enter an alternative email address if desired (CIN requires your valid business email address for your training organization). Keeping your profile up to date helps us better serve you, ensures your account is correctly linked with CompTIA’s CRM, streamlines processes, enhances communication, and guarantees you never miss out on valuable CIN opportunities. Thank you for taking this important step! step!

CompTIA's New Publication: What is DDos? A Guide for Protection

  • Thread starter Liz Wannemacher
  • Start date
DDoS was the subject of a major project I had for one of my Master's courses. The year was 2006 and I was using this Dell Inspiron - good machine, but wasn't exactly top of the line. I needed to model a DDoS attack in a network simulation tool, basically using a few hundred zombies to attack this little web server for 60 seconds of simulation time, while a telecommuting user was trying to get on with a dial-up connection. The map and diagram as well as the theory was all rock solid. My instructor even commented on how thorough that was.

Then, I fired it up and let the fun begin.

Well, network simulator tools can be VERY processor intensive and that Core 2 processor instantly spiked to 100%. So, I let the simulator run - all night. Mind you the simulation was for a sixty-second attack, but the calculations churned away. It took about 12 hours in real time to complete the simulation. I got a nice pile of telemetry from the test, but I think my network simulator did its own version of realism - and sprung a DDoS attack of its own.

Good times.
 
  • Like
Reactions: Stephen Schneiter