Abstract
Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
JAMK University of Applied Sciences, Jyväskylä Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE). http://www.jyvsectec.fi/en/rgce/
Zolotukhin, M., Hämäläinen, T., Kokkonen, T., Siltanen, J.: Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 406–411, August 2014
Floyd, S., Paxson, V.: Difficulties in Simulating the Internet. IEEE/ACM Trans. Netw. 9(4), 392–403 (2001)
Casilari, E., Gonzblez, F.J., Sandoval, F.: Modeling of HTTP traffic. Communications Letters, IEEE 5(6), 272–274 (2001)
Botta, A., Dainotti, A., Pescapè, A.: A tool for the generation of realistic network workload for emerging networking scenarios. Computer Networks (Elsevier) 14(15), 3531–3547 (2012)
Hong, S.-S., Wu, S.: On interactive internet traffic replay. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 247–264. Springer, Heidelberg (2006)
Pries, R., Wamser, F., Staehle, D., Heck, K., Tran-Gia, P.: On traffic characteristics of a broadband wireless internet access. In: Next Generation Internet Networks, NGI 2009, pp. 1–7, July 2009
Li, T., Liu, J., Lei, Z., Xie, Y.: Characterizing service providers traffic of mobile internet services in cellular data network. In: 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), vol. 1, pp. 134–139, August 2013
The University of Southern California (USC-ISI), The Information Sciences Institute, TG Traffic Generation Tool. http://www.postel.org/tg/
The University of Kansas, The Information and Telecommunication Technology Center (ITTC), NetSpec Tool. http://www.ittc.ku.edu/netspec/
Netperf. http://www.netperf.org/netperf/
pksh -the Packet Shell. http://tecsiel.it/pksh/index.html
Universita’ degli Studi di Napoli “Federico II”, D-ITG, Distributed Internet Traffic Generator. http://traffic.comics.unina.it/software/ITG/
Angrisani, L., Botta, A., Miele, G., Vadursi, M.: An experimental characterization of the internal generation cycle of an open-source software traffic generator. In: 2013 IEEE International Workshop on Measurements and Networking Proceedings (M N), pp. 74–78, October 2013
Botta, A., Dainotti, A., Pescapè, A.: Do You Trust Your Software-Based Traffic Generator. IEEE Communications Magazine, 158–165 (2010)
White, B., et al.: An integrated experimental environment for distributed systems and networks. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002. USENIX Association, December 2002
Kleen, A.: Linux Programmer’s Manual RAW(7). http://www.manpages.info/linux/raw.7.html
Kleen, A., Singhvi, N., Kuznetsov’s, A.: Linux Programmer’s Manual TCP(7). http://www.manpages.info/linux/tcp.7.html
Postel, J.: Transmission Control Protocol. RFC 793 (INTERNET STANDARD). Updated by RFCs 1122, 3168, 6093, 6528. Internet Engineering Task Force, September 1981. http://www.ietf.org/rfc/rfc793.txt
Tanase, M.: IP Spoofing: An Introduction. The Security Blog, March 2003. http://www.symantec.com/connect/articles/ip-spoofing-introduction
WireShark Wiki, Libpcap File Format. http://wiki.wireshark.org/Development/LibpcapFileFormat/
Tcpreplay. http://tcpreplay.synfin.net/
Khayari, R.E.A., Rücker, M., Lehman, A., Musovic, A.: ParaSynTG: a parameterized synthetic trace generator for representation of WWW traffic. In: SPECTS (2008), pp. 317–323, June 16-18, 2008
Postel, J.: User Datagram Protocol. RFC 768 (INTERNET STANDARD). Internet Engineering Task Force, August 1980. http://www.ietf.org/rfc/rfc768.txt
The GO Programming Language. https://golang.org/
Hoare, C.A.R.: Communicating Sequential Processess. Communications of the ACM 21(8), 666–677 (1978)
Fette, I., Melnikov, A.: WebSocket Protocol. RFC 6455 (INTERNET STANDARD). Internet Engineering Task Force, December 2011. http://www.ietf.org/rfc/rfc6455.txt
Ministry of defense press release May 8, 2013. Cyber Security Exercise in Jyväskylä, May 13–17, 2013. Kyberturvallisuusharjoitus Jyväskylässä, May 13–17, 2013. http://www.defmin.fi/ajankohtaista/tiedotteet/2013/kyberturvallisuusharjoitus_jyvaskylassa_13.-17.5.2013.5502.news
Finnish Defence Forces Press Release, June 3, 2014, Performance of Cyber Security is developed by co-operation between Government Authorities and University. Kyber-suorituskykyä hiotaan viranomaisten ja korkeakoulujen yhteistyöllä. http://www.fdf.fi/wcm/su+puolustusvoimat.fi/pv.fi+staattinen+sivusto+su/puolustusvoimat/tiedotteet/kybersuorituskykya+hiotaan+viranomaisten+ja+korkeakoulujen+yhteistyolla
Luo, S., Marin, G.A.: Realistic Internet traffic simulation through mixture modeling and a case study. In: Proceedings of the 2005 Winter Simulation Conference, pp. 2408–2416, December 4–7, 2005
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Kokkonen, T., Hämäläinen, T., Silokunnas, M., Siltanen, J., Zolotukhin, M., Neijonen, M. (2015). Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NEW2AN 2015 2015. Lecture Notes in Computer Science(), vol 9247. Springer, Cham. https://doi.org/10.1007/978-3-319-23126-6_23
Download citation
DOI: https://doi.org/10.1007/978-3-319-23126-6_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23125-9
Online ISBN: 978-3-319-23126-6
eBook Packages: Computer ScienceComputer Science (R0)