2019
DOI: 10.1109/access.2019.2947062
|View full text |Cite
|
Sign up to set email alerts
|

An Interactive Traffic Replay Method in a Scaled-Down Environment

Abstract: Network traffic replay plays an essential role in network security tests. However, performing traffic replay in a network is still a challenge due to the different scales of the live network and the replay network. In this study, we investigate three problems of the interactive traffic replay under a scaled-down replay environment and then propose a multi-node traffic replay method. In this method, a self-elected IP mapping algorithm is designed to construct the IP mapping between the target network and the li… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…Record and Replay (RnR) systems have been researched and applied in many fields. They can be classified into following categories: application level [11,12,24], OS kernel level [3,35], network traffic level [20,21,23] and VM level [25ś29].…”
Section: Related Workmentioning
confidence: 99%
“…Record and Replay (RnR) systems have been researched and applied in many fields. They can be classified into following categories: application level [11,12,24], OS kernel level [3,35], network traffic level [20,21,23] and VM level [25ś29].…”
Section: Related Workmentioning
confidence: 99%
“…Another example is TCPivo [ 40 ], a high-speed packet replay engine implemented on commodity hardware. Replays are particularly useful in generating backbone traffic due to the complexity of their artificial generation [ 41 ]. They entail the category of most realistic general-purpose generators but with difficulties for adaptation to particular contexts on delivering the entropy required for particular applications of the simulation/emulation.…”
Section: Introductionmentioning
confidence: 99%
“…A cyber range is an environment where individuals can practice cyber defence skills and validate various security tools [1]. Background traffic is an essential element in the cyber range and provides a realistic network scenario [2]. In addition, the use of background traffic has the effect of confusing cyber defence trainees to misidentify benign background traffic as malicious traffic [3].…”
Section: Introductionmentioning
confidence: 99%