Uma Comparação de Ferramentas Open Source de CLI para Geração de Ataques DDoS em Ambientes de Internet

  • Arthur Ferreira UFMG
  • Carlos Pedroso UFPR
  • Agnaldo Batista UFPR
  • Aldri Santos UFPR / UFMG

Resumo


Os ataques DDoS comprometem a disponibilidade de infraestruturas críticas de rede por meio de fluxos de dados massivos e coordenados. O uso de ferramentas de simulação de DDoS permite reproduzir esses comportamentos de forma controlada e segura, colaborando assim ao desenvolvimento de sistemas de segurança. Entretanto, há ainda uma carência de estudos comparativos que auxiliem na seleção de ferramentas quanto à fidelidade e ao desempenho. Este trabalho apresenta uma análise comparativa de sete ferramentas open source de linha de comando (CLI) voltadas à simulação de ataques DDoS nas camadas de rede e transporte. Essa avaliação experimental levou em conta a capacidade de geração de tráfego, a capacidade de customização e a aderência à taxonomia de Jelena Mirkovic para modelagem de anomalias. Os resultados alcançados apontam diferenças significativas entre as ferramentas, no qual a T50 favorece experimentos volumétricos, a Scapy a flexibilidade na modelagem de anomalias e a Trafgen um equilíbrio entre ambos aspectos.

Referências

Alalyan, F., Awad, M., Jaafar, W., and Langar, R. (2025). Secure Distributed Federated Learning for Cyberattacks Detection in B5G Open Radio Access Networks. IEEE Open Journal of the Communications Society, 6:3067–3081.

Alhijawi, B., Almajali, S., Elgala, H., Bany Salameh, H., and Ayyash, M. (2022). A survey on DoS/DDoS mitigation techniques in SDNs: Classification, comparison, solutions, testing tools and datasets. Computers and Electrical Engineering, 99:107706.

Anand, N., Saifulla, M. A., Babu Ponnuru, R., Reddy Alavalapati, G., Patan, R., and Gandomi, A. H. (2025). Securing Software Defined Networks: A Comprehensive Analysis of Approaches, Applications, and Future Strategies Against DoS Attacks. IEEE Access, 13:64473–64515.

Batista, A., Pedroso, C., Brísio, S., Rodrigues, G., and Santos, A. (2025). Evaluating Robustness and Reliability of a C-NIDS for IoT Networks in Virtualized Environments. IEEE Latin America Transactions, 23(5):363–370.

Behal, S. and Kumar, K. (2017). Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. Int. J. Netw. Secur., 19(3):383–393.

Bistene, J. V., dos Santos, A. F. P., das Chagas, C. E., and Salles, R. M. (2025). Modeling Network Traffic Generators for Cyber Ranges: A Systematic Literature Review. Journal of Network and Systems Management, 33(2):1–45.

Chamoli, S. and Mittal, V. (2024). DDoS Landscape: Insight into Attacks and Tools. In 2024 International Conference on Electrical Electronics and Computing Technologies (ICEECT), volume 1, pages 1–6.

Choueiri, S., Mazloum, A., Elizalde, S., Kfoury, E. F., and Crichigno, J. (2025). Volumetric DDoS Attack Detection and Mitigation using P4-DPDK. In 2025 IEEE Int. Black Sea Conference on Communications and Networking (BlackSeaCom), pages 1–6.

Dai, J., Dai, Z., and Thing, V. L. L. (2025). Cyber-Resilience Enhancement With Cross-Domain Software-Defined Network for Cyber-Physical Microgrids Against Denial of Service Attacks. IEEE Transactions on Industrial Cyber-Physical Systems, 3:273–284.

de Cámara, X. S., Flores, J. L., Arellano, C., Urbieta, A., and Zurutuza, U. (2023). Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks. Computers Security, 131:103299.

Farias Jr, E. P., Jacinto Tavares, A. C., and Nogueira, M. (2023). A Runtime DDoS Attack Detection Technique Based on Stochastic Mathematical Model. In 2023 IEEE Latin-American Conference on Communications (LATINCOM), pages 1–6.

Goel, M., Singh, S., Garg, A., and Roy, N. R. (2023). Comparative Study of DDoS Attacks Tools and Their Analysis. In 2023 International Conference on IoT, Communication and Automation Technology (ICICAT), pages 1–8.

Kaur, H., Behal, S., and Kumar, K. (2015). Characterization and comparison of Distributed Denial of Service attack tools. In 2015 International Conference on Green Computing and Internet of Things (ICGCIoT), pages 1139–1145.

Khanan, A., Abdelgadir Mohamed, Y., Mohamed, A. H. H. M., and Bashir, M. (2024). From Bytes to Insights: A Systematic Literature Review on Unraveling IDS Datasets for Enhanced Cybersecurity Understanding. IEEE Access, 12:59289–59317.

Mahadev, Kumar, V., and Kumar, K. (2016). Classification of DDoS attack tools and its handling techniques and strategy at application layer. In 2016 2nd International Conference on Advances in Computing, Communication, Automation (ICACCA) (Fall), pages 1–6.

Mirkovic, J. (2025). DDoS Attack List. [link]. Accessed: 07/10/2025.

Nagpal, B., Sharma, P., Chauhan, N., and Panesar, A. (2015). DDoS tools: Classification, analysis and comparison. In 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pages 342–346.

Obaid, H. S. (2020). Denial of service attacks: Tools and categories. International Journal of Engineering Research & Technology (IJERT), 9(03):631–636.

Pakmehr, A., Aßmuth, A., Taheri, N., and Ghaffari, A. (2024). DDoS attack detection techniques in IoT networks: a survey. Cluster Computing, 27(10):14637–14668.

Poisson, M., Carnier, R., and Fukuda, K. (2024). GothX: a generator of customizable, legitimate and malicious IoT network traffic. In Proceedings of the 17th Cyber Security Experimentation and Test Workshop, CSET ’24, page 65–73, New York, NY, USA. Association for Computing Machinery.
Publicado
25/05/2026
FERREIRA, Arthur; PEDROSO, Carlos; BATISTA, Agnaldo; SANTOS, Aldri. Uma Comparação de Ferramentas Open Source de CLI para Geração de Ataques DDoS em Ambientes de Internet. In: SIMPÓSIO BRASILEIRO DE REDES DE COMPUTADORES E SISTEMAS DISTRIBUÍDOS (SBRC), 44. , 2026, Praia do Forte/BA. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2026 . p. 1443-1456. ISSN 2177-9384. DOI: https://doi.org/10.5753/sbrc.2026.19897.

Artigos mais lidos do(s) mesmo(s) autor(es)