A Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logs

dc.authorscopusid 55933785000
dc.authorscopusid 57207472273
dc.authorscopusid 36660828400
dc.authorscopusid 56049419400
dc.contributor.author Daneshgadeh, Salva
dc.contributor.author Oney, Mehmet Ugur
dc.contributor.author Kemmerich, Thomas
dc.contributor.author Baykal, Nazife
dc.date.accessioned 2024-10-06T10:58:08Z
dc.date.available 2024-10-06T10:58:08Z
dc.date.issued 2019
dc.department Atılım University en_US
dc.department-temp [Daneshgadeh, Salva; Baykal, Nazife] Middle East Tech Univ, Inst Informat, Dept Informat Syst, Ankara, Turkey; [Oney, Mehmet Ugur] Atilim Univ, Dept Comp Engn, Ankara, Turkey; [Kemmerich, Thomas] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Trondheim, Norway en_US
dc.description.abstract The continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and virtualization techniques empower researchers to adapt all experimental scenarios of network security in a more cost and time-effective manner before deciding about the final security solution. This study presents a detailed guideline to model and develop a simultaneous virtualized and simulated environment for computer networks to practice different network attack scenarios. The preliminary object of this study is to create a test bed for network anomaly detection research. The required dataset for anomaly or attack detection studies can be prepared based on the proposed environment in this study. We used open source GNS3 emulation tool, Docker containers, pfSense firewall, NTOPNG network traffic-monitoring tool, BoNeSi DDoS botnet simulator, Ostinato network workload generation tool and MYSQL database to collect simulated network traffic data. This simulation environment can also be utilized in a variety of cybersecurity studies such as vulnerability analysis, attack detection, penetration testing and monitoring by minor changes. en_US
dc.description.woscitationindex Book Citation Index – Science
dc.identifier.citationcount 0
dc.identifier.endpage 79 en_US
dc.identifier.isbn 9781785613562
dc.identifier.isbn 9781785613555
dc.identifier.issn 2513-8774
dc.identifier.scopus 2-s2.0-85115688939
dc.identifier.startpage 55 en_US
dc.identifier.uri https://hdl.handle.net/20.500.14411/8859
dc.identifier.volume 18 en_US
dc.identifier.wos WOS:000479149700004
dc.language.iso en en_US
dc.publisher inst Engineering Tech-iet en_US
dc.relation.ispartof Modeling and Simulation of Complex Communication Networks en_US
dc.relation.ispartofseries IET Professional Applications of Computing Series
dc.relation.publicationcategory Kitap Bölümü - Uluslararası en_US
dc.rights info:eu-repo/semantics/closedAccess en_US
dc.scopus.citedbyCount 0
dc.subject [No Keyword Available] en_US
dc.title A Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logs en_US
dc.type Book Part en_US
dc.wos.citedbyCount 0
dspace.entity.type Publication

Files

Collections