Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available.

Building an emulation environment for cyber security analyses of complex networked systems / Tanasache, F. D.; Sorella, M.; Bonomi, S.; Rapone, R.; Meacci, D.. - (2019), pp. 203-212. (Intervento presentato al convegno 20th International Conference on Distributed Computing and Networking, ICDCN 2019 tenutosi a Bangalore; India) [10.1145/3288599.3288618].

Building an emulation environment for cyber security analyses of complex networked systems

Tanasache F. D.
;
Sorella M.
;
Bonomi S.
;
Meacci D.
2019

Abstract

Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus enabling the study of cyber defense strategies under real and controllable traffic and attack scenarios. In this paper, we propose a methodology that makes use of a combination of techniques of network and security assessment, and the use of cloud technologies to build an emulation environment with adjustable degree of affinity with respect to actual reference networks or planned systems. As a byproduct, starting from a specific study case, we collected a dataset consisting of complete network traces comprising benign and malicious traffic, which is feature-rich and publicly available.
2019
20th International Conference on Distributed Computing and Networking, ICDCN 2019
Cyber Security; Emulation Environment; Private Cloud
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Building an emulation environment for cyber security analyses of complex networked systems / Tanasache, F. D.; Sorella, M.; Bonomi, S.; Rapone, R.; Meacci, D.. - (2019), pp. 203-212. (Intervento presentato al convegno 20th International Conference on Distributed Computing and Networking, ICDCN 2019 tenutosi a Bangalore; India) [10.1145/3288599.3288618].
File allegati a questo prodotto
File Dimensione Formato  
Tanasache_Building_2019.pdf

solo gestori archivio

Tipologia: Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza: Tutti i diritti riservati (All rights reserved)
Dimensione 2.57 MB
Formato Adobe PDF
2.57 MB Adobe PDF   Contatta l'autore

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/1384388
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 6
  • ???jsp.display-item.citation.isi??? 1
social impact