메뉴 건너뛰기




Volumn 9247, Issue , 2015, Pages 254-267

Analysis of approaches to internet traffic generation for cyber security research and exercise

Author keywords

Cyber security; Cyber security research and exercise; Internet traffic generation; Network security

Indexed keywords

INTERNET; INTERNET OF THINGS; MALWARE; NEXT GENERATION NETWORKS;

EID: 84948991180     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-23126-6_23     Document Type: Conference Paper
Times cited : (10)

References (30)
  • 1
    • 84949016055 scopus 로고    scopus 로고
    • JAMK University of Applied Sciences, Jyväskylä Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE)
    • JAMK University of Applied Sciences, Jyväskylä Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE). http://www.jyvsectec. fi/en/rgce/
  • 3
    • 0035416013 scopus 로고    scopus 로고
    • Difficulties in Simulating the Internet
    • Floyd, S., Paxson, V.: Difficulties in Simulating the Internet. IEEE/ACM Trans. Netw. 9(4), 392–403 (2001)
    • (2001) IEEE/ACM Trans. Netw , vol.9 , Issue.4 , pp. 392-403
    • Floyd, S.1    Paxson, V.2
  • 5
    • 84865800505 scopus 로고    scopus 로고
    • A tool for the generation of realistic network workload for emerging networking scenarios
    • Botta, A., Dainotti, A., Pescapè, A.: A tool for the generation of realistic network workload for emerging networking scenarios. Computer Networks (Elsevier) 14(15), 3531–3547 (2012)
    • (2012) Computer Networks (Elsevier) , vol.14 , Issue.15 , pp. 3531-3547
    • Botta, A.1    Dainotti, A.2    Pescapè, A.3
  • 6
    • 33745672516 scopus 로고    scopus 로고
    • On interactive internet traffic replay
    • In: Valdes, A., Zamboni, D. (eds.), Springer, Heidelberg
    • Hong, S.-S., Wu, S.: On interactive internet traffic replay. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 247–264. Springer, Heidelberg (2006)
    • (2006) RAID 2005. LNCS , vol.3858 , pp. 247-264
    • Hong, S.-S.1    Wu, S.2
  • 9
    • 84949016056 scopus 로고    scopus 로고
    • The University of Southern California (USC-ISI), The Information Sciences Institute, TG Traffic Generation Tool
    • The University of Southern California (USC-ISI), The Information Sciences Institute, TG Traffic Generation Tool. http://www.postel. org/tg/
  • 10
    • 84949016057 scopus 로고    scopus 로고
    • The University of Kansas, The Information and Telecommunication Technology Center (ITTC), NetSpec Tool
    • The University of Kansas, The Information and Telecommunication Technology Center (ITTC), NetSpec Tool. http://www.ittc. ku. edu/netspec/
  • 11
    • 84949016058 scopus 로고    scopus 로고
    • Netperf
    • Netperf. http://www.netperf. org/netperf/
  • 12
    • 84949016059 scopus 로고    scopus 로고
    • pksh-the Packet Shell
    • pksh-the Packet Shell. http://tecsiel. it/pksh/index.html
  • 13
    • 84949016060 scopus 로고    scopus 로고
    • Universita’ degli Studi di Napoli “Federico II”, D-ITG, Distributed Internet Traffic Generator
    • Universita’ degli Studi di Napoli “Federico II”, D-ITG, Distributed Internet Traffic Generator. http://traffic.comics. unina. it/software/ITG/
  • 17
    • 84949016062 scopus 로고    scopus 로고
    • Linux Programmer’s Manual RAW(7)
    • Kleen, A.: Linux Programmer’s Manual RAW(7). http://www.manpages. info/linux/raw. 7.html
    • Kleen, A.1
  • 18
    • 84949016063 scopus 로고    scopus 로고
    • Linux Programmer’s Manual TCP(7)
    • Kleen, A., Singhvi, N., Kuznetsov’s, A.: Linux Programmer’s Manual TCP(7). http://www.manpages. info/linux/tcp. 7.html
    • Kleen, A.1    Singhvi, N.2    Kuznetsov’S, A.3
  • 19
    • 84949016064 scopus 로고    scopus 로고
    • Transmission Control Protocol. RFC 793 (INTERNET STANDARD). Updated by RFCs 1122, 3168, 6093, 6528. Internet Engineering Task Force, September 1981
    • Postel, J.: Transmission Control Protocol. RFC 793 (INTERNET STANDARD). Updated by RFCs 1122, 3168, 6093, 6528. Internet Engineering Task Force, September 1981. http://www.ietf. org/rfc/rfc793. txt
    • Postel, J.1
  • 20
    • 69249204694 scopus 로고    scopus 로고
    • The Security Blog
    • Tanase, M.: IP Spoofing: An Introduction. The Security Blog, March 2003. http://www.symantec.com/connect/articles/ip-spoofing-introduction
    • (2003) IP Spoofing: An Introduction
    • Tanase, M.1
  • 21
    • 84949016065 scopus 로고    scopus 로고
    • WireShark Wiki, Libpcap File Format
    • WireShark Wiki, Libpcap File Format. http://wiki. wireshark. org/Development/LibpcapFileFormat/
  • 22
    • 84949016066 scopus 로고    scopus 로고
    • Tcpreplay
    • Tcpreplay. http://tcpreplay. synfin. net/
  • 23
    • 60449112639 scopus 로고    scopus 로고
    • ParaSynTG: A parameterized synthetic trace generator for representation of WWW traffic
    • June 16-18
    • Khayari, R. E. A., Rücker, M., Lehman, A., Musovic, A.: ParaSynTG: a parameterized synthetic trace generator for representation of WWW traffic. In: SPECTS (2008), pp. 317–323, June 16-18, 2008
    • (2008) SPECTS (2008) , pp. 317-323
    • Khayari, R.E.A.1    Rücker, M.2    Lehman, A.3    Musovic, A.4
  • 24
    • 84949016067 scopus 로고    scopus 로고
    • User Datagram Protocol. RFC 768 (INTERNET STANDARD). Internet Engineering Task Force, August 1980
    • Postel, J.: User Datagram Protocol. RFC 768 (INTERNET STANDARD). Internet Engineering Task Force, August 1980. http://www.ietf. org/rfc/rfc768. txt
    • Postel, J.1
  • 25
    • 84949016068 scopus 로고    scopus 로고
    • The GO Programming Language
    • The GO Programming Language. https://golang. org/
  • 26
    • 0018005391 scopus 로고
    • Communicating Sequential Processess
    • Hoare, C. A. R.: Communicating Sequential Processess. Communications of the ACM 21(8), 666–677 (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.8 , pp. 666-677
    • Hoare, C.A.R.1
  • 28
    • 84949016069 scopus 로고    scopus 로고
    • Ministry of defense press release May 8, 2013. Cyber Security Exercise in Jyväskylä, May 13–17, 2013. Kyberturvallisuusharjoitus Jyväskylässä, May 13–17, 2013
    • Ministry of defense press release May 8, 2013. Cyber Security Exercise in Jyväskylä, May 13–17, 2013. Kyberturvallisuusharjoitus Jyväskylässä, May 13–17, 2013. http://www.defmin.fi/ajankohtaista/tiedotteet/2013/kyberturvallisuusharjoitus_jyvaskylassa_13.-17. 5. 2013. 5502. news
  • 29
    • 84949016070 scopus 로고    scopus 로고
    • Finnish Defence Forces Press Release, June 3, 2014, Performance of Cyber Security is developed by co-operation between Government Authorities and University. Kybersuorituskykyä hiotaan viranomaisten ja korkeakoulujen yhteistyöllä
    • Finnish Defence Forces Press Release, June 3, 2014, Performance of Cyber Security is developed by co-operation between Government Authorities and University. Kybersuorituskykyä hiotaan viranomaisten ja korkeakoulujen yhteistyöllä. http://www.fdf. fi/wcm/su+puolustusvoimat. fi/pv. fi+staattinen+sivusto+su/puolustusvoimat/tiedotteet/kybersuorituskykya+hiotaan+viranomaisten+ja+korkeakoulujen+yhteistyolla
  • 30
    • 33846670896 scopus 로고    scopus 로고
    • Realistic Internet traffic simulation through mixture modeling and a case study
    • December 4–7
    • Luo, S., Marin, G. A.: Realistic Internet traffic simulation through mixture modeling and a case study. In: Proceedings of the 2005 Winter Simulation Conference, pp. 2408–2416, December 4–7, 2005
    • (2005) Proceedings of the 2005 Winter Simulation Conference , pp. 2408-2416
    • Luo, S.1    Marin, G.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.