Abstract

This paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exercises, network threats, network emulation, network traffic replay, network topologies, and common network services. From this research a requirements specification was produced to encapsulate the features required to create this tool. A network, containing many of the aspects researched, was designed and implemented using Netkit-NG to act as a blueprint for the tool and to further knowledge in the construction of an emulated network. Following this the tool was developed and tested to ensure requirements were met.

Highlights

  • Computer security is an essential part of keeping an organisation’s data safe from malicious affect

  • Research was conducted into common network services and cyber defence exercises in the literature review

  • A networked system was planned and created, this network can be configured to a users specifications which gives multiple learning opportunities in the practical implementation of networks and programming

Read more

Summary

Introduction

Computer security is an essential part of keeping an organisation’s data safe from malicious affect. The tool produced by this work allows professionals to receive training in the security of sensor/actuator networks in a variety of user definable network scenarios This tool allows the production of a complex virtual network, and the simulation of network traffic, without requiring an extensive background in that area by creating the virtual network based solely on user input. This allows more focus to be placed on training professionals than setting up and maintaining the network, the attack simulation element of this tool means common threats can be simulated with ease and without intimate knowledge of the tools required to attack a network, shifting focus more on defence and protection of a network. Once this had been done, the papers were read in more detail and the content used where appropriate

Related Work
Cyber Defence Exercises
Threat Actors
Attack Taxonomy
Network Emulation
Netkit
VMware Server
Replay of Network Traffic
Network Topologies
Common Network Services
File Transfer
Webpages
2.10. Remote Access
2.11. Key References
Network Overview
Collision Domain
Email Server
DHCP Server
Critical Analysis
Network Traffic Replay
Creation of Network Traffic
Capture of Network Traffic
Traffic Replay
Program Overview
Discussion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.