Ixia BreakingPoint

Application and Security Test

Product Menu

Real World Security Test to Best Prepare for Attack Defense

Problem: Real-time Challenges of Real-world Testing

Today, organizations rely on various security solutions to protect their networks from network attacks and traffic anomalies. But the more tools are deployed, the more complex the security infrastructure becomes. Results: It is difficult to verify complex security solutions, and expanding specifications is extremely challenging. Worse, these complex system interactions pose a serious threat to security performance and network recovery.

Solution: Provide Easy-to-Use Test Ecosystem to Meet Modern Network Requirements

today's business requires an application and security testing solution that can verify the stability, accuracy and quality of the network and network equipment.

BreakingPoint came into being. By simulating real-world legitimate traffic, distributed denial of service (DDoS), exploit, malware and fuzzing,BreakingPoint the security infrastructure of an organization that can be verified, reducing the risk of network damage by about 80% and helping to improve attack defense readiness by nearly 70%.

special configuration or security settings resist network attacks? The BreakingPoint method is to simulate normal quality and malicious traffic under the most realistic conditions to verify and optimize the network. Security infrastructure can also be verified on a large scale to ensure ease of use, increased agility, and rapid network testing.

:

  • simulation 300 multiple real-world application protocols

  • allows you to customize and manipulate any protocol, including raw data.

  • Generates Hybrid Protocols at High Speed with Real Protocol Quantity

  • supports more than 36,000 attacks and malware

  • Generates all types of traffic from a single port, including legitimate traffic, DDoS, and malicious programs.

  • updates the attack virus database in half a month to ensure that you are aware of the latest malicious applications and threats.


Specifications:

Product MeReal-world security test to provide the best accuracy for attack defense.Problem: Real-time Challenges of Real-world Testing

BreakingPoint Specifications
ApplicationsSee our detailed list of the 290+ stateful application protocols
Wireless Interfaces
  • S1-U (eNodeB and SGW sides)

  • S1-MME (eNodeB side)

  • SGi (PDN side)

  • S5/8 (SGW and PGW sides)

  • S11 (MME and SGW sides)

  • Gn (SSGN and GGSN sides)

  • Wireless Protocols Supported:

  • S1AP

  • GTP-C v1, GTP-C v2, GTP-U v1

  • SCTP (over UDP or IP)

Wireless Operational Modes
  • User Equipment

  • 3G GGSN

  • 3G SGSN

  • eNodeB/MME (GTPv2)

  • eNodeB/MME/SGW (GTPv2)

  • eNodeB (S1AP/ GTPv1)

  • SGW/PGW

  • MME/SGW/PGW

  • PGW

Network Access
  • IPv4/IPv6 Static Hosts

  • IPv4/IPv6 External Hosts

  • IPv4 DHCP Hosts

  • IPv4 DHCP Server

  • VLAN

  • IPv4/IPv6 Router

  • 6rd CE Routers

  • IPv4 DNS

  • IPv6 DNS

  • IPsec IKEv1

  • IPsec IKEv2

Test Methodologies/Labs
  • RFC 2544 Lab

  • Multicast Lab

  • Lawful Intercept Lab

  • Session Sender Lab

  • LTE Lab

  • Device Validation Lab

  • MultiBox testing

  • Resiliency Score

  • Data Center Resiliency

  • LTE Lab

Security: Exploits/Malware
  • 36,000+ attacks

  • 6,000+ exploits

  • 29,000+ malware

  • 100+ evasion classes

  • Multi-layer evasions

Security: Dos/DDosAttacks include:
  • IP-based DoS attack types:

ICMP flood test case
ICMP fragmentation test case
  • Ping flood test case

  • UDP-based DoS attack types:

  • UDP flood test case

  • UDP fragmentation test case

  • Non-spoofed UDP flood test case

  • Syn flood test case

  • Syn-ack flood test case

  • Data ack and push flood test case

  • Fragmented ack test case

  • Session attack test case

  • DNS flood attack case

  • Excessive verb attack case

  • Recursive GET Floods

  • Slow POSTs

  • Zeus

  • SpyEye

  • BlackEnergy

  • Duqu

  • Pushdo Cutwail

  • TCP-based DoS attack types:

  • Application-layer attack types:

  • Botnets:







Solution

The State of Enterprise Security Resilience

Read Ixia's survey report on security resilience to better understand the current situation for enterprise network security.

Application and Threat Intelligence (ATI)