Show simple item record

dc.contributor.authorChapman, Samuelen
dc.contributor.authorSmith, Richarden
dc.contributor.authorMaglaras, Leandrosen
dc.contributor.authorJanicke, Helgeen
dc.date.accessioned2017-11-08T14:05:25Z
dc.date.available2017-11-08T14:05:25Z
dc.date.issued2017-08-11
dc.identifier.citationChapman, S. et al. (2017) Can a Network Attack Be Simulated in an Emulated Environment for Network Security Training? Journal of Sensor and Actuator Networks, 6 (3), 16en
dc.identifier.urihttp://hdl.handle.net/2086/14832
dc.descriptionopen access articleen
dc.description.abstractThis paper outlines a tool developed with the purpose of creating a simple configurable emulated network environment that can be used in cyber defence exercises. Research has been conducted into the various related subject areas: cyber defence exercises, network threats, network emulation, network traffic replay, network topologies, and common network services. From this research a requirements specification was produced to encapsulate the features required to create this tool. A network, containing many of the aspects researched, was designed and implemented using Netkit-NG to act as a blueprint for the tool and to further knowledge in the construction of an emulated network. Following this the tool was developed and tested to ensure requirements were met.en
dc.language.isoenen
dc.publisherMDPIen
dc.titleCan a Network Attack Be Simulated in an Emulated Environment for Network Security Training?en
dc.typeArticleen
dc.identifier.doihttps://dx.doi.org/10.3390/jsan6030016
dc.peerreviewedYesen
dc.fundern/aen
dc.projectidn/aen
dc.cclicenceCC BYen
dc.date.acceptance2017-08-08en
dc.exception.reasonopen access articleen
dc.researchinstituteCyber Technology Institute (CTI)en


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record