Next Article in Journal
RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments
Previous Article in Journal
On-Line RSSI-Range Model Learning for Target Localization and Tracking
Article Menu

Export Article

Open AccessFeature PaperArticle
J. Sens. Actuator Netw. 2017, 6(3), 16; doi:10.3390/jsan6030016

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?

School of Computer Science and Informatics, De Montfort University, The Gateway, Leicester LE1 9BH, UK
These authors contributed equally to this work.
*
Author to whom correspondence should be addressed.
Received: 29 May 2017 / Revised: 24 July 2017 / Accepted: 8 August 2017 / Published: 11 August 2017
View Full-Text   |   Download PDF [933 KB, uploaded 11 August 2017]   |  

Abstract

This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exercises, network threats, network emulation, network traffic replay, network topologies, and common network services. From this research a requirements specification was produced to encapsulate the features required to create this tool. A network, containing many of the aspects researched, was designed and implemented using Netkit-NG to act as a blueprint for the tool and to further knowledge in the construction of an emulated network. Following this the tool was developed and tested to ensure requirements were met. View Full-Text
Keywords: emulation; network threat; network attack; network services; network topology; cyber defence exercises emulation; network threat; network attack; network services; network topology; cyber defence exercises
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? J. Sens. Actuator Netw. 2017, 6, 16.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
J. Sens. Actuator Netw. EISSN 2224-2708 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top