Log in
Forgot password ?
Become a member for free
Sign up
Sign up
New member
Sign up for FREE
New customer
Discover our services
Dynamic quotes 


Delayed Quote. Delayed Nasdaq - 07/23 04:00:00 pm
28.82 USD   +1.44%
07/21NETSCOUT : Paying It Forward
07/14NETSCOUT : to Report Q1 FY'22 Financial Results on July 29th
07/01NETSCOUT : The New Challenges of Monitoring 5G Networks
SummaryMost relevantAll NewsAnalyst Reco.Other languagesPress ReleasesOfficial PublicationsSector news

NetScout : Top Three Tactics for Optimizing DDoS Resiliency Testing

06/16/2021 | 01:40pm EDT
June 16th, 2021

RSS Feed

Written by Mark Gardner, Director of Global Sales, NETSCOUT Test Optimization Business Unit

Cybersecurity is built to protect computer systems and networks from theft, damage, and service disruption from attacks such as distributed denial-of-service (DDoS). DDoS attacks work by taking a target website or online service offline by overwhelming the target or its surrounding infrastructure with a flood of internet traffic.

Although DDoS attacks have been around for more than 20 years, they remain something of a moving target as cybercriminals regularly discover and weaponize new attack vectors and techniques, such as the following:

  • Launching different types of attacks such as volumetric, TCP state-exhaustion, and application-layer attacks simultaneously as multivector attacks, each with a unique signature.
  • Using different botnets to change the source of attacks and stay one step ahead of blocked IP addresses.
  • Using DDoS attacks as a smoke screen to distract from the real cybercrime underway. DDoS traffic can consist of incoming messages, requests for connections, or fake packets.

But here's the catch: attacks are based on legitimate traffic, and it can be difficult to determine which traffic is legitimate 'good' traffic and which is the 'bad' traffic. Therefore, you must continually test your web servers and services, cloud offerings, and network topology for their ability to allow good traffic to pass through while stopping the bad traffic.

The reality is that a DDoS attack is a matter of 'when,' not 'if.' With that in mind, this is what we recommend for verifying your resiliency to DDoS attacks:

1. Test your solutions. All DDoS mitigation solutions are tested. The question is whether the testing is conducted in a proactive, controlled manner or by a real attack. Proactive testing is a far better plan, because it gives you a chance to fix issues outside the stress of a real attack in which services might be failing. All public-facing services are subject to attack and should be tested. In addition to web servers, this includes session border controllers (SBCs), unified communication and collaboration (UC&C) systems, edge routers, and others.

2. Test regularly, particularly after significant upgrades. For example, one U.S. service provider tests the resiliency and vulnerability of cloud-based virtual environments prior to providing them to its commercial accounts. A second company-a network equipment manufacturer-tests for DDoS resiliency during preproduction testing of embedded mitigation software in a series of its hardware and software solutions. In one test, for example, the company found a product's CPU (I/O card) was pegged at 99 percent after sending only 1 Gbps of TCP SYN traffic, which blocked 'good' traffic from passing as initially expected. The company was therefore able to adjust the software prior to commercial launch.

3. Test by using customized attack simulations. One of the best ways to check how well your defenses can differentiate between good traffic and bad traffic is to launch attacks alongside good traffic. A good testing tool will let companies easily create custom multivector attacks that integrate into the existing test and mitigation infrastructure. Launching simulated attacks allows companies to find and fix issues before they are discovered in the heat of a real attack.

DDoS attacks are on the rise exponentially-in terms of both frequency and size (bandwidth consumed). The latest NETSCOUT Threat Intelligence Report highlighted record-breaking DDoS attack activity in 2020, with more than 10 million observed attacks.

Additionally, DDoS attack costs are increasing globally. According to a recent NETSCOUT Worldwide Infrastructure Security Report, the cost of downtime associated with internet service outages caused by DDoS attacks was $221,836.80, while a report from Allianz Global Corporate & Specialty found that the average cost of a cybercrime to an organization increased by 70 percent over five years, to $13 million. Can your business really afford not to test your DDoS resiliency?

Learn more about how to test the resiliency of your node, endpoint, web server or web service, cloud offering, application, network, or topology against DDoS attack by using NETSCOUT's SpectraSecureDDoS resiliency test tool.


NetScout Systems Inc. published this content on 16 June 2021 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 16 June 2021 17:39:00 UTC.

© Publicnow 2021
07/21NETSCOUT : Paying It Forward
07/14NETSCOUT : to Report Q1 FY'22 Financial Results on July 29th
07/01NETSCOUT : The New Challenges of Monitoring 5G Networks
06/30NETSCOUT : To Adapt or Not to Adapt?
06/28NETSCOUT : Continuous Monitoring with NETSCOUT Omnis Cyber Investigator and AWS ..
06/23NETSCOUT : Are You Prepared for AI Malware?
06/21NETSCOUT : Making Hackathons a Family Affair
06/17NETSCOUT : The Families That Hack Together
06/16NETSCOUT : Top Three Tactics for Optimizing DDoS Resiliency Testing
06/15NETSCOUT : Work-from-Home Trend Puts SaaS in the Crosshairs
More news
Financials (USD)
Sales 2022 849 M - -
Net income 2022 25,7 M - -
Net cash 2022 375 M - -
P/E ratio 2022 22,7x
Yield 2022 -
Capitalization 2 105 M 2 105 M -
EV / Sales 2022 2,04x
EV / Sales 2023 1,67x
Nbr of Employees 2 409
Free-Float 56,9%
Duration : Period :
NetScout Systems, Inc. Technical Analysis Chart | MarketScreener
Full-screen chart
Technical analysis trends NETSCOUT SYSTEMS, INC.
Short TermMid-TermLong Term
Income Statement Evolution
Mean consensus HOLD
Number of Analysts 3
Last Close Price 28,41 $
Average target price 28,00 $
Spread / Average Target -1,44%
EPS Revisions
Managers and Directors
Anil K. Singhal Chairman, President & Chief Executive Officer
Jean Ann Bua CFO, Treasurer, Chief Accounting Officer & EVP
Bruce Allen Kelley Chief Technology Officer & Senior Vice President
Ashwani Singhal Senior Vice President-Research & Development
Thor Wallace Chief Information Officer & Senior Vice President
Sector and Competitors