A Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logs

dc.authorscopusid55933785000
dc.authorscopusid57207472273
dc.authorscopusid36660828400
dc.authorscopusid56049419400
dc.contributor.authorDaneshgadeh, Salva
dc.contributor.authorOney, Mehmet Ugur
dc.contributor.authorKemmerich, Thomas
dc.contributor.authorBaykal, Nazife
dc.date.accessioned2024-10-06T10:58:08Z
dc.date.available2024-10-06T10:58:08Z
dc.date.issued2019
dc.departmentAtılım Universityen_US
dc.department-temp[Daneshgadeh, Salva; Baykal, Nazife] Middle East Tech Univ, Inst Informat, Dept Informat Syst, Ankara, Turkey; [Oney, Mehmet Ugur] Atilim Univ, Dept Comp Engn, Ankara, Turkey; [Kemmerich, Thomas] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, Trondheim, Norwayen_US
dc.description.abstractThe continued and rapid progress of network technology has revolutionized all modern critical infrastructures and business models. Technologies today are firmly relying on network and communication facilities which in turn make them dependent on network security. Network-security investments do not always guarantee the security of organizations. However, the evaluation of security solutions requires designing, testing and developing sophisticated security tools which are often very expensive. Simulation and virtualization techniques empower researchers to adapt all experimental scenarios of network security in a more cost and time-effective manner before deciding about the final security solution. This study presents a detailed guideline to model and develop a simultaneous virtualized and simulated environment for computer networks to practice different network attack scenarios. The preliminary object of this study is to create a test bed for network anomaly detection research. The required dataset for anomaly or attack detection studies can be prepared based on the proposed environment in this study. We used open source GNS3 emulation tool, Docker containers, pfSense firewall, NTOPNG network traffic-monitoring tool, BoNeSi DDoS botnet simulator, Ostinato network workload generation tool and MYSQL database to collect simulated network traffic data. This simulation environment can also be utilized in a variety of cybersecurity studies such as vulnerability analysis, attack detection, penetration testing and monitoring by minor changes.en_US
dc.description.woscitationindexBook Citation Index – Science
dc.identifier.citationcount0
dc.identifier.endpage79en_US
dc.identifier.isbn9781785613562
dc.identifier.isbn9781785613555
dc.identifier.issn2513-8774
dc.identifier.scopus2-s2.0-85115688939
dc.identifier.startpage55en_US
dc.identifier.urihttps://hdl.handle.net/20.500.14411/8859
dc.identifier.volume18en_US
dc.identifier.wosWOS:000479149700004
dc.language.isoenen_US
dc.publisherinst Engineering Tech-ieten_US
dc.relation.ispartofModeling and Simulation of Complex Communication Networksen_US
dc.relation.ispartofseriesIET Professional Applications of Computing Series
dc.relation.publicationcategoryKitap Bölümü - Uluslararasıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.scopus.citedbyCount0
dc.subject[No Keyword Available]en_US
dc.titleA Simulation Environment for Cybersecurity Attack Analysis Based on Network Traffic Logsen_US
dc.typeBook Parten_US
dc.wos.citedbyCount0
dspace.entity.typePublication

Files

Collections