Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? Journal of Sensor and Actuator Networks 2017, 6, 16, doi:10.3390/jsan6030016.
Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? Journal of Sensor and Actuator Networks 2017, 6, 16, doi:10.3390/jsan6030016.
Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? Journal of Sensor and Actuator Networks 2017, 6, 16, doi:10.3390/jsan6030016.
Chapman, S.; Smith, R.; Maglaras, L.; Janicke, H. Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? Journal of Sensor and Actuator Networks 2017, 6, 16, doi:10.3390/jsan6030016.
Abstract
This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exercises, network threats, network emulation, network traffic replay, network topologies, and common network services. From this research a requirements specification was produced to encapsulate the features required to create this tool. A network, containing many of the aspects researched, was designed and implemented using Netkit-NG to act as a blueprint for the tool and to further knowledge in the construction of an emulated network. Following this the tool was developed and tested to ensure requirements were met.
Engineering, Electrical and Electronic Engineering
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.