Ukážkové príklady na IXIA BreakingPoint

Abstract

This bachelor thesis is focused on running tests on special hardware, which can be used to simulate legitimate traffic, denial of service attacks, exploits, malware, fuzzing, and validating an organization‘ssecurity infrastructure. The device uses BreakingPoint software and can simulate legitimate and malicious traffic to validate networks in realistic conditions.

Description

Subject(s)

BreakingPoint, PerfectStorm ONE, bakalářská práce

Citation