Analysis of approaches to Internet traffic generation for cyber security research and excercise
Kokkonen, Tero; Hämäläinen, Timo; Silokunnas, Marko; Siltanen, Jarmo; Zolotukhin, Mikhail; Neijonen, Mikko (2015)
Julkaisun pysyvä osoite on
Kokkonen T., Hämäläinen T., Silokunnas M., Siltanen J., Zolotukhin M., Neijonen M., (2015). Analysis of approaches to Internet traffic generation for cyber security research and excercise. Balandin S., Andreev S., Koucheryavy Y. (Eds.)., Internet of Things, Smart Spaces, and Next Generation Networks and Systems. 15th International Conference, NEW2AN 2015, and 8th Conference, ruSMART 2015, St. Petersburg, Russia, August 26-28, 2015, Proceedings., In: Lecture Notes in Computer Science, Springer. doi:10.1007/978-3-319-23126-6_23
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.