The articles presented in Table 5 demonstrate various methodologies for generating and replicating network traffic, each with unique approaches and applications.
6.1 Model-Based Approach
This approach offers flexibility, allowing the generation of traffic that accurately represents a wide variety of scenarios and conditions, encompassing various network topologies, protocols, and applications. Model-based traffic generators serve various purposes such as:
Table 10 Validation Parameters

|
[9]
|
|
|
|
🗸
|
🗸
|
|
|
|
🗸
|
|
|
|
|
|
|
[13]
|
|
|
|
🗸
|
🗸
|
|
|
|
🗸
|
|
|
|
|
|
|
[6]
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
[10]
|
|
|
|
🗸
|
🗸
|
|
|
|
|
|
|
|
|
|
|
[11]
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
|
|
|
|
[17]
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
🗸
|
|
|
🗸
|
🗸
|
🗸
|
🗸
|
[8]
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
|
|
|
|
[15]
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
[16]
|
🗸
|
🗸
|
🗸
|
|
|
|
|
|
|
|
|
|
🗸
|
🗸
|
🗸
|
[12]
|
|
|
|
🗸
|
🗸
|
|
|
|
🗸
|
|
|
|
|
|
|
[7]
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
|
|
|
|
|
|
|
[14]
|
🗸
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
🗸
|
🗸
|
🗸
|
🗸
|
|
|
|
• Performance testing: Model-based traffic generators are instrumental in simulating a large number of users accessing a website or web service, facilitating performance evaluation under heavy load.
• Security analysis: These generators can produce realistic attack traffic, which is valuable for assessing the security of network systems and applications.
• Network analysis: Model-based traffic generators allow the creation of different traffic scenarios to evaluate network behavior and efficiency.
• Network simulation: They play a key role in generating realistic traffic to simulate networks and assess their performance under varied conditions.
One of the main advantages of model-based traffic generation is its ability to generate traffic that accurately emulates real-world conditions without the need to capture and replay real traffic traces. This characteristic is crucial in scenarios where capturing real-world traffic may be impractical or infeasible, especially for emerging or novel network technologies.
However, model-based traffic generation also presents challenges. Creating models that faithfully represent real-world traffic patterns can be complex. Additionally, model-based traffic generators can be computationally demanding.
Harpoon [6] is a software-based approach that utilizes statistical models to generate realistic network traffic at the IP flow level. It self-configures by extracting parameters from Netflow logs or packet traces. Its components, such as the flow generator, packet generator, load generator, and address generator, operate in a software environment. Future work includes scalability evaluation and integration into simulation environments.
Swing [8] is a software-based approach that uses machine learning to create adaptive network traffic. It employs software components like an event generator, propagation model, and response model, which are trained using real network traffic data. Future work for Swing involves improving model accuracy and evaluating its performance across different network sizes.
The work by [14] proposes a novel approach to generate realistic Internet of Things (IoT) network traffic using generative deep learning (GDL). The method utilizes a combination of an autoencoder and a generative adversarial network (GAN) to effectively capture and reproduce statistical properties of IoT network traffic. Future work includes enhancing traffic accuracy, extending the method to support different types of IoT traffic, and developing real-time traffic generation.
BRUNO [17] is a hardware-based approach that generates high-performance network traffic using a dedicated network processor. The traffic generator and network processor are hardware components that work together to generate and send network packets. Future work for BRUNO includes exploring different types of networks.
[16] proposes an algorithm that clusters hosts into clusters based on traffic statistics extracted from real data. This approach, grounded in spatial and temporal patterns, generates more realistic background traffic in network simulations. Future work aims to improve computational efficiency and explore applications in different types of networks.
PAC-GAN [12] is a software-based approach that combines Generative Adversarial Network (GAN) with Convolutional Neural Network (CNN) to generate realistic network traffic. The generator and discriminator components are implemented in the software. Future work includes application to different types of traffic and adaptation to different network types.
6.2 Trace-Based Approach
Trace-based traffic generation offers a highly accurate approach as it reproduces real traffic. However, it is less flexible as it can only replicate traffic closely resembling the captured trace. Trace-based traffic generators find utility in various applications, including:
• Performance testing: They replicate real-world traffic traces to evaluate the performance of network systems and applications under authentic conditions.
• Security analysis: These generators replicate attack traffic traces to assess the security of network systems and applications against real attacks.
• Network analysis: They recreate real-world traffic traces to study network behavior and efficiency under realistic conditions.
• Network simulation: They replicate real-world traffic traces to simulate networks and assess their performance under different conditions.
One of the main advantages of trace-based traffic generation is its ability to generate traffic closely resembling real-world conditions, making it particularly valuable when testing network systems and applications in highly realistic scenarios.
However, trace-based traffic generation also presents challenges. Acquiring representative real-world traffic traces can be a complex task. Additionally, the computational demands of trace-based traffic generators, especially when reproducing extensive traffic traces, can be substantial.
Event-Automaton synchronized replay (EAR) [15] is supported by a client-server architecture composed of three main components: trace collector, trace replay, and environment emulator. However, there are limitations that need to be addressed, such as challenges related to handling packet loss or corruption, emulating diverse wireless effects or environments, and reproducing traffic with variable WLAN implementations or parameters.
Monkey [10] is a software-based tool for TCP tracking and replay, generating realistic network traffic. It utilizes software components including Monkey See and Monkey Do for data collection and replay. Monkey See collects TCP traffic data using a network sniffer, while Monkey Do accurately replays TCP traffic on a test network. Future work includes extending its application to other types of traffic and exploring usage in different types of networks.
LARIAT [9] is a software-based approach designed for information security applications. It replicates real-world network conditions with software components including physical nodes, a control system, a simulation system, and testing tools. The control system generates network traffic, and the simulation system replicates the real network environment. Future work includes performance improvement and exploration of broader applications.
TCPivo [13] is a high-performance packet replay engine-based software to replicate network events. It consists of software components including an event generator, propagation model, and response model. Future work includes improving accuracy, extending to other types of traffic, and adapting to different network types using network simulation techniques.
6.3 Hybrid Approaches
Traffic generators can adopt a hybrid approach that combines the flexibility of model-based generation and the accuracy of trace-based generation. This approach allows for the overall traffic pattern to be established using model-based generation, while specific details such as realistic packet sizes and timings can be introduced using trace-based generation.
For instance, a traffic generator may use the model-based approach to create a general traffic pattern and then use trace-based generation to fine-tune the generated traffic by adding details such as packet sizes and timings.