IDS mailing list archives
Re: Worm attack generation tools
From: Stefano Zanero <zanero () elet polimi it>
Date: Fri, 18 Aug 2006 21:51:20 +0200
miaomitiff119 wrote:
Hi,:) Does anyone know any tools which can be used to simulate attack traffic (especially traffic pattern of worm attacks)?
With the usual caveats on the uselessness of running IDS evaluations without fully planning them: http://blackhat.com/presentations/bh-federal-06/BH-Fed-06-Zanero.pdf Here is the tool you probably want: http://portal.acm.org/citation.cfm?coll=GUIDE&dl=GUIDE&id=1028799 Best, Stefano Zaner ------------------------------------------------------------------------ Test Your IDS Is your IDS deployed correctly? Find out quickly and easily by testing it with real-world attacks from CORE IMPACT. Go to http://www.securityfocus.com/sponsor/CoreSecurity_focus-ids_040708 to learn more. ------------------------------------------------------------------------
Current thread:
- Worm attack generation tools miaomitiff119 (Aug 17)
- Re: Worm attack generation tools Stefano Zanero (Aug 18)
- Re: Worm attack generation tools Joey Peloquin (Aug 18)
- RE: Worm attack generation tools Robert D. Holtz (Aug 21)
- Re: Worm attack generation tools Joey Peloquin (Aug 21)
- RE: Worm attack generation tools Robert D. Holtz (Aug 21)
- Re: Worm attack generation tools Joey Peloquin (Aug 21)
- RE: Worm attack generation tools Robert D. Holtz (Aug 21)
- RE: Worm attack generation tools Tony Haywood (Aug 24)
- RE: Worm attack generation tools Robert D. Holtz (Aug 21)
- <Possible follow-ups>
- Re: Worm attack generation tools whonosewho (Aug 21)