6533b7d3fe1ef96bd1261303

RESEARCH PRODUCT

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

Tero KokkonenTero KokkonenMarko SilokunnasJarmo SiltanenMikko NeijonenMikhail ZolotukhinTimo Hämäläinen

subject

Engineeringbusiness.industryNetwork securityInternet trafficComputer securitycomputer.software_genreInternet Architecture BoardInternational securityUse caseThe InternetbusinessResilience (network)computerTraffic generation model

description

Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.

https://doi.org/10.1007/978-3-319-23126-6_23