Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cloud
    • Cloud
    • Cybersecurity
    • Networking

    Ixia Generates Malicious Traffic for Network, Cloud Security Testing

    Written by

    Fahmida Y. Rashid
    Published February 9, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Ixia is offering IT security administrators a network vulnerability testing tool that can detect and exploit vulnerabilities in both enterprise networks and cloud computing environments.

      The IxLoad-Attack recreates malicious traffic and floods the network to detect and exploit known vulnerabilities. With this testing kit, security managers can thoroughly test cloud infrastructures as well as enterprise, government, and service provider networks.

      “Ixia’s security test solution is the perfect tool for verifying not only the effectiveness and accuracy of security solutions, but also measuring key network performance while under attack,” Vic Alston, Senior Vice President of Product Development at Ixia, wrote in a Feb. 9 statement.

      The tool can validate network security appliance performance by assessing whether attacks were effectively and accurately blocked, according to Ixia. The tool can also monitor network performance to ensure the appliances aren’t slowing down mission-critical applications while under attack.

      It can also send malicious traffic over encrypted and non-encrypted connections, Ixia said. The IxLoad-IPsec application can be used to encrypt all types of traffic for performance testing of VPN (virtual private network) gateways and other encryption devices. This ensures that security managers can test how their networks handle malware in both encrypted IPsec and SSL traffic as well as in normal traffic.

      IxLoad test applications can authenticate sessions using EAP, PPP, and NAC, Ixia said. It also uses GTE-encapsulation to test 3G and LTE wireless core networks.

      The testing tool has a comprehensive database of more than 6,000 unique attacks, Ixia said. IxLoad-Attack updates itself regularly to keep its database of threats up-to-date. Along with malicious traffic, it can also provide customized “good” traffic that can be used as a reference to test what security devices are doing, Ixia said.

      There has been an explosion in the type and volume of attacks companies have to defend against, and the attacks have also become much more complex. Malware like Stuxnet are targeting devices IT managers hadn’t thought about before, such as industrial controller systems, and the growing popularity of cloud services within the organization means there are multiple “boundaries” that need to be protected, Ixia said.

      “Virtualized data centers, cloud computing, and network infrastructures, while providing an economic means of satisfying Internet and intranet requirements, vastly increase security enforcement complexity,” said Alston.

      With IxLoad-Attack, security managers can generate Internet-scale distributed denial-of-service attacks in the controlled environment to view how the network and applications would fare in a real DDOS attack, according to the company. The DDOS feature can simulated various types of attacks, including SYN,ICMP and ARP floods, Ixia said. While DDOS attacks have always been a concern to IT managers, they have dominated security news recently with high-profile attacks against corporations and government Web sites.

      “Security concerns are at the forefront of IT managers’ minds as they seek to balance security and access,” said Jeff Wilson, Analyst at Infonetics. With security products continuously being updated with the latest threat information, security managers have to continually test existing network configurations, Wilson said.

      The IxLoad-Attack tool will be demonstrated during the RSA Conference in San Francisco, Feb. 14 to Feb. 17.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.