Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.

Authors

Kokkonen Tero, Hämäläinen Timo, Silokunnas Marko, Siltanen Jarmo, Zolotukhin Mikhail, Neijonen Mikko

Cite as

Kokkonen T., Hämäläinen T., Silokunnas M., Siltanen J., Zolotukhin M., Neijonen M. (2015) Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise. In: Balandin S., Andreev S., Koucheryavy Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART 2015, NEW2AN 2015. Lecture Notes in Computer Science, vol 9247. Springer, Cham

DOI

https://doi.org/10.1007/978-3-319-23126-6_23

Share: