IxLoad-Attack: Network Security Testing



Similar documents
For IT Infrastructure, Mobile and Cloud Computing - Why and how

IxLoad TM Adobe HDS Player Emulation

CS5008: Internet Computing

Firewall Defaults and Some Basic Rules

Firewall Defaults, Public Server Rule, and Secondary WAN IP Address

Firewall Testing Methodology W H I T E P A P E R

IxLoad VoIP SIP, MGCP Features

Malicious Network Traffic Analysis

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

IxLoad: Testing Microsoft IPTV

Firewall Firewall August, 2003

Application Service Testing Enabling scalable delivery of layer 4-7 services

IxLoad Data Mail (SMTP, POP3, IMAP) Features

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

White Paper. Network Security Testing

Chapter 8 Security Pt 2

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SonicOS 5.9 / / 6.2 Log Events Reference Guide with Enhanced Logging

Denial of Service (DOS) Testing IxChariot

A Very Incomplete Diagram of Network Attacks

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

IxLoad Voice SIP Key Features

How To Protect A Dns Authority Server From A Flood Attack

Worldwide Education Services

Networking for Caribbean Development

Server Load Balancing (SLB) Testing IxLoad

IxLoad TM : Data HTTP, SSL, and FTP

Firewalls. Test your Firewall knowledge. Test your Firewall knowledge (cont) (March 4, 2015)

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

ICSA Labs Network IPS Certification Testing Report Network IPS Enterprise Certification Testing Criteria - Version 1.4.

Introduction of Intrusion Detection Systems

CompTIA Network+ (Exam N10-005)

1. Firewall Configuration

PerfectStorm 100GbE, High- Performance Application and Security Load Modules

Evaluating IPv6 Firewalls & Verifying Firewall Security Performance

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Firewalls. Chapter 3

Server Load Balancer Testing

Denial Of Service. Types of attacks

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

APPLICATION DELIVERY. Black Book. Edition 10. Application Delivery. June PN Rev H June 2014 i

About Firewall Protection

Why Is DDoS Prevention a Challenge?

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Computer forensics

NIP6300/6600 Next-Generation Intrusion Prevention System

General Network Security

Security Technology White Paper

Application DDoS Mitigation

Astaro Security Gateway V7 Active/Active-Cluster Licensing Partner FAQ

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Safeguards Against Denial of Service Attacks for IP Phones

How To Block A Ddos Attack On A Network With A Firewall

VALIDATING DDoS THREAT PROTECTION

Barracuda Intrusion Detection and Prevention System

Competitive Testing of the Cisco ISA500 Security Appliance

Enabling a Converged World. Testing Multiplay Networks

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

LTE transport network security Jason S. Boswell Head of Security Sales, NAM Nokia Siemens Networks

LoadMaster Application Delivery Controller Security Overview

Denial of Service Attacks

Cisco ASA, PIX, and FWSM Firewall Handbook

SonicOS 5.9 One Touch Configuration Guide

DDoS Protection. How Cisco IT Protects Against Distributed Denial of Service Attacks. A Cisco on Cisco Case Study: Inside Cisco IT

IxLoad - Layer 4-7 Performance Testing of Content Aware Devices and Networks

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Seminar Computer Security

Acquia Cloud Edge Protect Powered by CloudFlare

Chapter 5. Figure 5-1: Border Firewall. Firewalls. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall. Figure 5-1: Border Firewall

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.

DDoS Attacks Can Take Down Your Online Services

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

CS 356 Lecture 16 Denial of Service. Spring 2013

Recommended IP Telephony Architecture

Gigabit Multi-Homing VPN Security Router

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

How Cisco IT Protects Against Distributed Denial of Service Attacks

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Gigabit SSL VPN Security Router

Firewalls and Intrusion Detection

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS NETWORK SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

OfficeScan 10 Enterprise Client Firewall Updated: March 9, 2010

Dos & DDoS Attack Signatures (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

BlackRidge Technology Transport Access Control: Overview

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Voice Over IP and Firewalls

Network Protection Against DDoS Attacks

A S B

PerfectStorm ONE 1GE/10GE Appliance Enterprise-Scale Application and Security Testing Anywhere, Anytime

Arbor s Solution for ISP

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Chapter 8 Network Security

Transcription:

IxLoad-Attack: Network Security Testing IxLoad-Attack tests network security appliances determining that they effectively and accurately block attacks while delivering high end-user quality of experience for mission-critical applications. IxLoad-Attack tests the wide range of network security appliances: Next generation firewalls, Intrusion detection and prevention systems (IDS/IPS), Anti-virus, anti-spam and URL filters, and VPN gateways Many of these devices need constant update and configuration to provide up-to-date protection. IxLoad-Attack includes an update service that keeps pace with current threats with bi-weekly. IxLoad-Attack delivers the security testing depth and scale needed to satisfy both device validation and continuous protection of cloud infrastructures as well as enterprise, government, and service provider networks. IxLoad-Attack is the only product that provides malicious traffic over both encrypted and non-encrypted links. IxLoad-Attack runs in parallel with all other IxLoad functions. Customized, real-world network traffic provides the "good" reference traffic that security devices must forward without affecting customer quality of experience (QoE). 6,000 unique live security attacks, the most comprehensive solution targeting known vulnerabilities Automatic updates via subscription service Multiple evasion techniques allows millions of attack permutations Most comprehensive coverage for published Microsoft vulnerabilities Line-rate distributed denial of service (DDoS) attacks over1ge, 10 GE and 40 GE interfaces Converged real-world application traffic mix with fully stateful voice, data and video emulations Mix of legitimate and malicious traffic on same ports Measures security effectiveness, performance benchmarking and service availability Backed by security research from two industry pioneers keeping IxLoad-Attack updated Delivery of attacks over IPsec tunnels for security and performance testing of VPNs and LTE security gateways Figure 1 - High-Level Vulnerabilities and DDoS Attacks P/N: 915-1787-01 Rev B April 2011 www.ixiacom.com Page 1 of 5

Features and Specifications Feature Category Published Vulnerabilities and Malware Detailed Description 6,000+ vulnerabilities and malware Highest coverage of Microsoft vulnerabilities Subscription service with online and offline malware and vulnerabilities updates Measures security effectiveness Emulates attacks over IPv4 and IPsec Comprehensive attack metadata Multiple attack evasions Packet capture using IxLoad s embedded Analyzer Attacker/server-initiated attacks Target/client initiated attacks (client based attacks) Multiplay Voice, Video, Data and Wireless Protocol Support Distributed Denial of Service General Features Internet: HTTP, P2P, FTP, SMTP, POP3, DNS and CIFS Video: IGMP, RTSP, Adobe Flash Player, Microsoft Silverlight, Adobe HLS, MPEG2, and H.264/AVC Voice: SIP, MGCP, H.323, H.248, Cisco Skinny, FAX over IP, video conferencing and PSTN Wireless: 3GPP packet core protocols used by GGSNs Both IPv4 and IPv6 Botnet and target emulation Attacks against live servers Attacks against intermediate devices Emulation of large botnets with millions of unique IP addresses Line rate attacks over 1GE, 10GE and 40GE interfaces Mix of voice, data, video and DDoS traffic on same port Mix multiple attack patterns on same port Attacks initiated from spoofed IPs or real IPs Attack rate and attack throughput test objectives P/N: 915-1787-01 Rev B April 2011 www.ixiacom.com Page 2 of 5

Distributed Denial of Service Patterns ARP attacks ARP Flooding ICMP attacks Fragmented ICMP Host Unreachable Nuke attack Ping of Death attack Ping Sweep attack TIDCMP attack UDP attacks DNS Flooding attack Evasive UDP attack UDP Flooding attack UDP Port Scan attack UDP Fragments attack TCP attack TCP ACK Flooding TCP SYN Flooding TCP FIN Flooding TCP RST Flooding TCP Land attack TCP Port scanning attack TCP SYN/ACK Flooding TCP Xmas tree attack IP attacks Malformed IP Options attack Nestea attack Short Fragment Teardrop IGMP attacks Fragmented IGMP attack IGMPSYN Flooding P/N: 915-1787-01 Rev B April 2011 www.ixiacom.com Page 3 of 5

Statistics Distributed Denial of Service Attack counters Attack rates Attack throughput Per attack counters Per attack rates Per attack throughput Drill down per port, attack and network Published Vulnerabilities & Malware Attack counters Attack rates Attack packet counters o Attacks Packets Sent/Received/ Not Received Attack packet rates o Packets per second Sent/Received/Not Received Attack throughput Per attack counters Attacks - Distribution by year Attacks - Distribution by vendor Attacks - Distribution by severity Attacks - Distribution by category Attacks - Distribution by threat type Attacks - Distribution by evasion class Drill down per port Drill down per attack Drill down per network P/N: 915-1787-01 Rev B April 2011 www.ixiacom.com Page 4 of 5

Ordering Information o 925-3601 One year security subscription for vulnerabilities and malware o 925-3604 IXLOAD-VULNERABILITIES-MALWARE-BASE o 925-3605 IXLOAD-VULNERABILITIES-MALWARE-PLUS o 925-3606 IXLOAD-DDoS-BASE o 925-3390 IXLOAD-STD-SECURITY, Software Bundle, L4-7 Performance Test Application This material is for informational purposes only and subject to change without notice. It describes Ixia's present plans to develop and make available to its customers certain products, features and functionality. Ixia is only obligated to provide those deliverables specifically included in a written agreement between Ixia and the customer. P/N: 915-1787-01 Rev B April 2011 www.ixiacom.com Page 5 of 5