Tel. +31­ 345 545535
 
Telecom
Products
 
Solutions
Coming soon...
 
Partners
Who we work with
 
News
What's going on
 
Media
Something to read
 
About
Who we are
 
Contact
Where we are
You are on the following page: Products > Datacenter > Security > Security Performance Nederlands | French
 
 

Security Performance

IP networks and protocols are susceptible to security attacks through malicious content such as viruses, worms and distributed denial of service (DDoS) attacks, along with the proliferation of Spam. Establishing performance limitations for converged IP services like Triple Play is critical for high quality performance applications such as IPTV, VoD and VoIP.

In most cases network architects have included firewalls, Intrusion detection and prevention applications into their network infrastructure. Understanding how these elements affect time sensitive applications such as voice and video is a real concern.



A very basic firewall will inspect packets for malicious content, this basic functionality will add a time delay to the packet. If the delay is excessive it may lead to degradation in a voice or video stream. Ensuring the correct setting in security equipment will overcome this, however what happens if the firewall is bombarded with 1,000s of illegal requests?

Today, cyber crime is widespread. Denial of Service Attacks, as the name implies attempt to block normal services by tying up the victims resources. A very basic attack is a GET request for a web page, but scaled to thousands of requests per second. Within fractions of a second buffers can become flooded, CPU performance exhausted etc., leading to legitimate application requests becoming extremely slow or worse case, ignored. This leads to very poor user quality of experience.


Testing Triple Play Security with diversifEye™

diversifEye™ comprehensively tests converged IP network architectures for weaknesses in security and importantly provides a unique ability to determine the effects of attacks on both overall network quality of service and quality of individual experience. diversifEye™ unique per flow architecture not only enables emulation of regular client side and server side applications, but also provides for the insertion of malicious attack content onto the network and into IP traffic streams. diversifEye™ generates a real world traffic mix of genuine and malicious content containing IPTV streams, VoD requests, VoIP calls, web or mail downloads in unfavorable conditions along with email virus/worm attacks, real spam generation, DDoS attacks on servers, malicious exploitation of protocols e.g. IGMP weaknesses, channel change requests and membership reports.

Generate a traffic mix of genuine and malicious content containing IPTV streams, VoD requests, VoIP calls, web or mail downloads in unfavorable conditions with virus/worm proliferation, denial of service attacks on servers, malicious exploitation of protocols e.g. IGMP weaknesses, channel change requests and membership reports.

 

 

Discover more about testing Security with diversifEye™ Testing the Performance of Secure IP Networks here>>

 

 

 

 

   

 
 

INDES-IDS BV offers solutions for Embedded Software Development as well as for the Telecommunication NEMS and Service Providers. In these markets we offer products of either the market leader or the innovation leaders. Our goal is to assist you to get to the market sooner by offering a combination of products, knowledge and services.