Skip to main content

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

  • Conference paper
  • First Online:
Internet of Things, Smart Spaces, and Next Generation Networks and Systems (ruSMART 2015, NEW2AN 2015)

Abstract

Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes different approaches and use cases to Internet traffic generation. Specific software for traffic generation is created, to which no existing traffic generation solutions were suitable.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. JAMK University of Applied Sciences, Jyväskylä Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE). http://www.jyvsectec.fi/en/rgce/

  2. Zolotukhin, M., Hämäläinen, T., Kokkonen, T., Siltanen, J.: Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 406–411, August 2014

    Google Scholar 

  3. Floyd, S., Paxson, V.: Difficulties in Simulating the Internet. IEEE/ACM Trans. Netw. 9(4), 392–403 (2001)

    Article  Google Scholar 

  4. Casilari, E., Gonzblez, F.J., Sandoval, F.: Modeling of HTTP traffic. Communications Letters, IEEE 5(6), 272–274 (2001)

    Article  Google Scholar 

  5. Botta, A., Dainotti, A., Pescapè, A.: A tool for the generation of realistic network workload for emerging networking scenarios. Computer Networks (Elsevier) 14(15), 3531–3547 (2012)

    Article  Google Scholar 

  6. Hong, S.-S., Wu, S.: On interactive internet traffic replay. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 247–264. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Pries, R., Wamser, F., Staehle, D., Heck, K., Tran-Gia, P.: On traffic characteristics of a broadband wireless internet access. In: Next Generation Internet Networks, NGI 2009, pp. 1–7, July 2009

    Google Scholar 

  8. Li, T., Liu, J., Lei, Z., Xie, Y.: Characterizing service providers traffic of mobile internet services in cellular data network. In: 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), vol. 1, pp. 134–139, August 2013

    Google Scholar 

  9. The University of Southern California (USC-ISI), The Information Sciences Institute, TG Traffic Generation Tool. http://www.postel.org/tg/

  10. The University of Kansas, The Information and Telecommunication Technology Center (ITTC), NetSpec Tool. http://www.ittc.ku.edu/netspec/

  11. Netperf. http://www.netperf.org/netperf/

  12. pksh -the Packet Shell. http://tecsiel.it/pksh/index.html

  13. Universita’ degli Studi di Napoli “Federico II”, D-ITG, Distributed Internet Traffic Generator. http://traffic.comics.unina.it/software/ITG/

  14. Angrisani, L., Botta, A., Miele, G., Vadursi, M.: An experimental characterization of the internal generation cycle of an open-source software traffic generator. In: 2013 IEEE International Workshop on Measurements and Networking Proceedings (M N), pp. 74–78, October 2013

    Google Scholar 

  15. Botta, A., Dainotti, A., Pescapè, A.: Do You Trust Your Software-Based Traffic Generator. IEEE Communications Magazine, 158–165 (2010)

    Google Scholar 

  16. White, B., et al.: An integrated experimental environment for distributed systems and networks. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002. USENIX Association, December 2002

    Google Scholar 

  17. Kleen, A.: Linux Programmer’s Manual RAW(7). http://www.manpages.info/linux/raw.7.html

  18. Kleen, A., Singhvi, N., Kuznetsov’s, A.: Linux Programmer’s Manual TCP(7). http://www.manpages.info/linux/tcp.7.html

  19. Postel, J.: Transmission Control Protocol. RFC 793 (INTERNET STANDARD). Updated by RFCs 1122, 3168, 6093, 6528. Internet Engineering Task Force, September 1981. http://www.ietf.org/rfc/rfc793.txt

  20. Tanase, M.: IP Spoofing: An Introduction. The Security Blog, March 2003. http://www.symantec.com/connect/articles/ip-spoofing-introduction

  21. WireShark Wiki, Libpcap File Format. http://wiki.wireshark.org/Development/LibpcapFileFormat/

  22. Tcpreplay. http://tcpreplay.synfin.net/

  23. Khayari, R.E.A., Rücker, M., Lehman, A., Musovic, A.: ParaSynTG: a parameterized synthetic trace generator for representation of WWW traffic. In: SPECTS (2008), pp. 317–323, June 16-18, 2008

    Google Scholar 

  24. Postel, J.: User Datagram Protocol. RFC 768 (INTERNET STANDARD). Internet Engineering Task Force, August 1980. http://www.ietf.org/rfc/rfc768.txt

  25. The GO Programming Language. https://golang.org/

  26. Hoare, C.A.R.: Communicating Sequential Processess. Communications of the ACM 21(8), 666–677 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  27. Fette, I., Melnikov, A.: WebSocket Protocol. RFC 6455 (INTERNET STANDARD). Internet Engineering Task Force, December 2011. http://www.ietf.org/rfc/rfc6455.txt

  28. Ministry of defense press release May 8, 2013. Cyber Security Exercise in Jyväskylä, May 13–17, 2013. Kyberturvallisuusharjoitus Jyväskylässä, May 13–17, 2013. http://www.defmin.fi/ajankohtaista/tiedotteet/2013/kyberturvallisuusharjoitus_jyvaskylassa_13.-17.5.2013.5502.news

  29. Finnish Defence Forces Press Release, June 3, 2014, Performance of Cyber Security is developed by co-operation between Government Authorities and University. Kyber-suorituskykyä hiotaan viranomaisten ja korkeakoulujen yhteistyöllä. http://www.fdf.fi/wcm/su+puolustusvoimat.fi/pv.fi+staattinen+sivusto+su/puolustusvoimat/tiedotteet/kybersuorituskykya+hiotaan+viranomaisten+ja+korkeakoulujen+yhteistyolla

  30. Luo, S., Marin, G.A.: Realistic Internet traffic simulation through mixture modeling and a case study. In: Proceedings of the 2005 Winter Simulation Conference, pp. 2408–2416, December 4–7, 2005

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tero Kokkonen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Kokkonen, T., Hämäläinen, T., Silokunnas, M., Siltanen, J., Zolotukhin, M., Neijonen, M. (2015). Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise. In: Balandin, S., Andreev, S., Koucheryavy, Y. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. ruSMART NEW2AN 2015 2015. Lecture Notes in Computer Science(), vol 9247. Springer, Cham. https://doi.org/10.1007/978-3-319-23126-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23126-6_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23125-9

  • Online ISBN: 978-3-319-23126-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics