Analysis of approaches to Internet traffic generation for cyber security research and excercise
Kokkonen, Tero; Hämäläinen, Timo; Silokunnas, Marko; Siltanen, Jarmo; Zolotukhin, Mikhail; Neijonen, Mikko (2015)
Avaa tiedosto
Lataukset:
Kokkonen, Tero
Hämäläinen, Timo
Silokunnas, Marko
Siltanen, Jarmo
Zolotukhin, Mikhail
Neijonen, Mikko
Editoija
Balandin, Sergey
Andreev, Sergey
Koucheryavy, Yevgeni
Springer
2015
Julkaisun pysyvä osoite on
https://urn.fi/URN:ISBN:978-3-319-23126-6
https://urn.fi/URN:ISBN:978-3-319-23126-6
Tiivistelmä
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.