Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

10/23/2018
by   Florin Dragos Tanasache, et al.
0

Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available.

READ FULL TEXT

page 4

page 13

page 27

research
09/03/2019

Towards Models for Availability and Security Evaluation of Cloud Computing with Moving Target Defense

Security is one of the most relevant concerns in cloud computing. With t...
research
12/07/2020

Real-time monitoring as a supplementary security component of vigilantism in modern network environments

The phenomenon of network vigilantism is autonomously attributed to how ...
research
08/26/2019

Airport Cyber Security and Cyber Resilience Controls

Cyber Security scares are the main areas of demerits associated with the...
research
03/21/2019

From Cyber-Security Deception To Manipulation and Gratification Through Gamification

With the ever growing networking capabilities and services offered to us...
research
01/25/2020

An Immunology-Inspired Network Security Architecture

The coming 5G networks have been enabling the creation of a wide variety...
research
05/13/2019

Features and Operation of an Autonomous Agent for Cyber Defense

An ever increasing number of battlefield devices that are capable of col...
research
06/13/2023

Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats

Advanced persistent threats (APTs) have novel features such as multi-sta...

Please sign up or login with your details

Forgot password? Click here to reset