![]() requires reconfiguration of the network and setting up the network to produce the desired network activity and cyber attacks. Consequently, conducting experiments on various network configurations involving different machines, servers, routing systems, IDS sensors, etc. The physical computer network requires the physical machines, networking, and IDS components. ![]() These two approaches have varying degrees of requirements, capabilities, and limitations. A second alternative consists of generating synthetic data through the use of simulation. ![]() One alternative consists of setting up a physical computer network absent of any critical data, performing cyber attacks on the network, and collecting data from intrusion detection systems. Since conducting cyber attack experiments on computer systems that contain critical data is very undesirable, several alternatives have been used. As the use of computer networks grows, cyber security is becoming increasingly important. This work is based in the need for testing situational awareness tools that are being developed to detect and analyze attacks on computer networks.
0 Comments
Leave a Reply. |