2020
DOI: 10.20533/jitst.2046.3723.2020.0085
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Study of Traffic Generators: Applicability for Malware Detection Testbeds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Specialists assigned numerical scores to the elements that influence the values using a measure that is highlighted in Table 2. The numerical methods (3)(4)(5)(6) are used to convert numeric values into TFNs that are identified as (l ij , mi ij , and u ij ), where l ij is lower significance, mi ij is middle significance, and u ij is uppermost significance events. Moreover, TFN ( EER REVIEW 8 of 20 The numerical methods (3)(4)(5)(6) are used to convert numeric values into TFNs that are identified as (lij, miij, and uij), where lij is lower significance, miij is middle significance, and uij is uppermost significance events.…”
Section: Fuzzy Ahp-topsis Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…Specialists assigned numerical scores to the elements that influence the values using a measure that is highlighted in Table 2. The numerical methods (3)(4)(5)(6) are used to convert numeric values into TFNs that are identified as (l ij , mi ij , and u ij ), where l ij is lower significance, mi ij is middle significance, and u ij is uppermost significance events. Moreover, TFN ( EER REVIEW 8 of 20 The numerical methods (3)(4)(5)(6) are used to convert numeric values into TFNs that are identified as (lij, miij, and uij), where lij is lower significance, miij is middle significance, and uij is uppermost significance events.…”
Section: Fuzzy Ahp-topsis Methodologymentioning
confidence: 99%
“…The traffic information is moved in bulk and then analyzed for any unusual behavior in the data. The team explores threats by using known attack signatures, as well as trends [1][2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Genesids supports stateful packet generation only, but there is no direct control of more granular packet settings, e.g., flags. On the other hand, TRex has more control that can change fields inside the packet, including the headers, trailers, payload, and flags, and intentionally send erroneous packets to test how the network reacts [74]. We considered TRex stateless configuration because it creates several packet generation streams, including IoT traffic.…”
Section: Traffic Generationmentioning
confidence: 99%