Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?

Version 1 : Received: 26 June 2017 / Approved: 27 June 2017 / Online: 27 June 2017 (05:16:41 CEST)

How to cite: Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?. Preprints 2017, 2017060119 (doi: 10.20944/preprints201706.0119.v1). Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training?. Preprints 2017, 2017060119 (doi: 10.20944/preprints201706.0119.v1).

Abstract

This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exercises, network threats, network emulation, network traffic replay, network topologies, and common network services. From this research a requirements specification was produced to encapsulate the features required to create this tool. A network, containing many of the aspects researched, was designed and implemented using Netkit-NG to act as a blueprint for the tool and to further knowledge in the construction of an emulated network. Following this the tool was developed and tested to ensure requirements were met.

Keywords

emulation; network threat; network attack; network services; network topology; cyber defence exercises

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our diversity statement.

Leave a public comment
Send a private comment to the author(s)
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.