Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?
AbstractThis paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exercises, network threats, network emulation, network traffic replay, network topologies, and common network services. From this research a requirements specification was produced to encapsulate the features required to create this tool. A network, containing many of the aspects researched, was designed and implemented using Netkit-NG to act as a blueprint for the tool and to further knowledge in the construction of an emulated network. Following this the tool was developed and tested to ensure requirements were met. View Full-Text
Scifeed alert for new publicationsNever miss any articles matching your research from any publisher
- Get alerts for new papers matching your research
- Find out the new papers from selected authors
- Updated daily for 49'000+ journals and 6000+ publishers
- Define your Scifeed now
Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? J. Sens. Actuator Netw. 2017, 6, 16.
Chapman S, Smith R, Maglaras L, Janicke H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? Journal of Sensor and Actuator Networks. 2017; 6(3):16.Chicago/Turabian Style
Chapman, Samuel; Smith, Richard; Maglaras, Leandros; Janicke, Helge. 2017. "Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?" J. Sens. Actuator Netw. 6, no. 3: 16.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.