[1] |
方滨兴, 贾焰, 李爱平 ,等. 网络空间靶场技术研究[J]. 信息安全学报, 2016,1(3): 1-9.
|
|
FANG B X , JIA Y , LI A P ,et al. Cyber Ranges:state-of-the-art and research challenges[J]. Journal of Cyber Security, 2016,1(3): 1-9.
|
[2] |
FERGUSON B , TALL A , OLSEN D . National cyber range overview[C]// Proceedings of 2014 IEEE Military Communications Conference. 2014: 123-128.
|
[3] |
WABISZEWSKI JR M G , ANDEL T R , MULLINS B E ,et al. Enhancing realistic hands-on network training in a virtual environment[C]// Proceedings of the 2009 Spring Simulation Multiconference. 2009: 1-8.
|
[4] |
ROSSEY L M , CUNNINGHAM R K , FRIED D J ,et al. LARIAT:Lincoln adaptable real-time information assurance testbed[C]// Proceedings of,IEEE Aerospace Conference. 2002:6.
|
[5] |
AN B . Network Testing with Simulated Traffic.Does Realism Matter[R]. 2014.
|
[6] |
MIYACHI T , MIWA S , HASEGAWA S ,et al. Hands-on environments for network technologies on StarBED[J]. Educational Technology Research, 2011,34(1/2): 107-118.
|
[7] |
INDEX C V N . Global mobile data traffic forecast update,2016-2021[R]. 2017.
|
[8] |
ANGRISANI L , BOTTA A , MIELE G ,et al. Experiment-driven modeling of open-source Internet traffic generators[J]. IEEE Transactions on Instrumentation and Measurement, 2014,63(11): 2529-2538.
|
[9] |
MOLNáR S , MEGYESI P , SZABó G , . How to validate traffic generators[C]// Proceedings of 2013 IEEE International Conference on Communications Workshops (ICC). 2013: 1340-1344.
|
[10] |
EMMERICH P , GALLENMüLLER S , ANTICHI G ,et al. Mind the gap - A comparison of software packet generators[C]// Proceedings of 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS). 2017: 191-203.
|
[11] |
RING M , SCHL?R D , LANDES D ,et al. Flow-based network traffic generation using Generative Adversarial Networks[J]. Computers & Security, 2019,82: 156-172.
|
[12] |
PREVEZANOS I , ANGELOU A , TSELIOS C ,et al. Hammer:a real-world end-to-end network traffic simulator[C]// Proceedings of 2017 IEEE 22nd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). 2017: 1-6.
|
[13] |
PARRY J , HUNTER D , RADKE K ,et al. A network forensics tool for precise data packet capture and replay in cyber-physical systems[C]// Proceedings of the Australasian Computer Science Week Multiconference. 2016: 1-10.
|
[14] |
LIN Y D , LIN P C , LIN Y ,et al. On-the-fly capture and replay mechanisms for multi-port network devices in operational networks[J]. IEEE Transactions on Network and Service Management, 2014,11(2): 158-171.
|
[15] |
HUSSAIN A , PRADKIN Y , HEIDEMANN J . Replay of malicious traffic in network testbeds[C]// Proceedings of 2013 IEEE International Conference on Technologies for Homeland Security (HST). 2013: 322-327.
|
[16] |
LI L , HAO Z Y , ZHANG Y Z ,et al. Traffic replay in virtual network based on IP-mapping[M]// Algorithms and Architectures for Parallel Processing. Cham: Springer, 2015: 697-713.
|
[17] |
CHU W B , GUAN X H , CAI Z M ,et al. Real-time volume control for interactive network traffic replay[J]. Computer Networks, 2013,57(7): 1611-1629.
|
[18] |
CALLEGATI F , CERRONI W , CONTOLI C ,et al. Performance of Network Virtualization in cloud computing infrastructures:the OpenStack case[C]// Proceedings of 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet). 2014: 132-137.
|