Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise
- 13 August 2015
- book chapter
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Analysis of HTTP Requests for Anomaly Detection of Web AttacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2014
- An experimental characterization of the internal generation cycle of an open-source software traffic generatorPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- Characterizing Service Providers Traffic of Mobile Internet Services in Cellular Data NetworkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2013
- A tool for the generation of realistic network workload for emerging networking scenariosComputer Networks, 2012
- Do you trust your software-based traffic generator?IEEE Communications Magazine, 2010
- On Interactive Internet Traffic ReplayLecture Notes in Computer Science, 2006
- An integrated experimental environment for distributed systems and networksPublished by Association for Computing Machinery (ACM) ,2002
- Difficulties in simulating the InternetIEEE/ACM Transactions on Networking, 2001
- Modeling of HTTP trafficIEEE Communications Letters, 2001
- Communicating sequential processesCommunications of the ACM, 1978