Botnet Attack DDoS Testing

DDoS attacks are usually launched from large numbers of compromised devices known as “bots” or “zombies”. A network of these bots under the control of an attacker is called a botnet. Botnets are used by criminals for various nefarious activities including sending spam or phishing e-mails, collecting private information and DDoS attacks. There is a large number of known botnets on the Internet varying in size from tens of thousands of bots, to tens of millions of bots.

Botnets are sent to battle using intermediate servers called Command and Control servers. The development of DDoS C&C servers has paralleled other online services. Initially, a single central server was used, which was easy to set-up and administer. However, that made it easier to also take down when it was identified. This led to redundant networks of C&C servers – and latterly secure peer-to-peer multitenant multi-server hierarchies which can be rented out. DDoS attacks are available as a service and there is an active competitive black marketplace for botnets.

DDoS command and control has given some hope to security companies in tackling the various security issues associated with botnets. At least they number in the thousands, rather than untold millions and disrupting them can disrupt the entire botnet.

Simulating DDoS botnet attacks in the wild

For the most realistic test patterns, activereach can perform simulated managed attacks from the latest bots in the wild such as the Mirai, Hulk and the DirtJumper family.

Please browse the activereach DDoS Dictionary for the full range of DDoS attacks that can be simulated our Managed Testing platform.