Generating background network traffic for network security testbeds

dc.contributor.author Qureshi, Hassan
dc.date 2019-12-13T03:29:22.000
dc.date.accessioned 2020-06-30T08:12:58Z
dc.date.available 2020-06-30T08:12:58Z
dc.date.copyright Sun Jan 01 00:00:00 UTC 2006
dc.date.issued 2006-01-01
dc.description.abstract <p>With the advancement of science and technology, there has been a rapid growth in computer network attacks. Most of them are in the form of sophisticated and smart attacks, which are hard to trace. Although researchers have been working on this issue - attack detection, prevention and mitigation - the existing network security evaluation techniques lack effective experimental infrastructure and rigorous scientific methodologies for developing and testing the cyber security technologies. To make progress in this area, we need to address one of the major shortcomings in evaluating network security mechanisms -- lack of relevant, representative network data. The research community is in need of tools that are able to generate scalable, tunable, and representative network traffic. Such tools are vital in a tested environment, where they can be used to evaluate the behavior and performance of security related tools. In this context, we present the Markov Traffic Generator (MTG), which is able to generate representative network traffic. The MTG follows a unique approach of generating background traffic at the session level, unlike the previous approaches operated on the packet level. The tool is application dependent and is able to generate various types of TCP traffic. The resulting tool is useful for researchers and developers in building, testing and evaluating cyber security related tools. In this work, we develop the classifications of background traffic generation models based on the past work and present a new toolkit, the Markov Traffic Generator (MTG). As opposed to past work, MTG uses a first order hierarchical Markov agent to generate background user behavior in network testbed. The Markov agents can be used to generate behavior that mimics observed traffic in real networks. The thesis concludes by showing that MTG can realistically replicate observed network behavior.</p>
dc.format.mimetype application/pdf
dc.identifier archive/lib.dr.iastate.edu/rtd/19088/
dc.identifier.articleid 20088
dc.identifier.contextkey 15987048
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath rtd/19088
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/73059
dc.language.iso en
dc.source.bitstream archive/lib.dr.iastate.edu/rtd/19088/Qureshi_ISU_2006_Q74.pdf|||Fri Jan 14 21:52:12 UTC 2022
dc.subject.keywords None
dc.title Generating background network traffic for network security testbeds
dc.type article
dc.type.genre thesis
dspace.entity.type Publication
thesis.degree.discipline None
thesis.degree.level thesis
thesis.degree.name Master of Science
File
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Qureshi_ISU_2006_Q74.pdf
Size:
6.56 MB
Format:
Adobe Portable Document Format
Description: