On automatic network environment cloning for facilitating cybersecurity training and testing
暂无分享,去创建一个
[1] Donald F. Towsley,et al. Inferring TCP connection characteristics through passive measurements , 2004, IEEE INFOCOM 2004.
[2] Antonio Pescapè,et al. A tool for the generation of realistic network workload for emerging networking scenarios , 2012, Comput. Networks.
[3] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[4] Sunny Behal,et al. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review , 2017, Int. J. Netw. Secur..
[5] Krishnashree Achuthan,et al. Scalable and Lightweight CTF Infrastructures Using Application Containers , 2016, ASE @ USENIX Security Symposium.
[6] Lee M. Rossey,et al. Extending the DARPA off-line intrusion detection evaluations , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[7] Yasuo Tan,et al. Cybersecurity Education and Training Support System: CyRIS , 2018, IEICE Trans. Inf. Syst..
[8] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[9] Chuan Xu,et al. A Scalable Parallel Architecture Based on Many-Core Processors for Generating HTTP Traffic , 2017 .
[10] Amin Vahdat,et al. Swing: Realistic and Responsive Network Traffic Generation , 2009, IEEE/ACM Transactions on Networking.