Attack simulation for post mortem forensic training networks security
Files
Beckers_65581700_Beugoms_65351400_2020.pdf
UCLouvain restricted access - Adobe PDF
- 5.38 MB
Beckers_65581700_Beugoms_65351400_2020_Appendix1.zip
UCLouvain restricted access - Unknown
- 7.48 MB
Details
- Supervisors
- Faculty
- Degree label
- Abstract
- When a network attack occurred it leaves some data in the packets emitted we can identify as suspect activity. It is then interesting to have some samples of packet captures of a network making traffic from classic users considered as white traffic and traffic from an attacker considered as malicious one. Theses captures are very useful when learning or designing a software to recognize the white traffic or/and the traffic provided by the attacker(s). Some tools are available to generate captures like .pcap files from a simulated network but it required a lot of installations and configurations that can result to a lot of time lost. Thus we develop a solution in Python that can be used like a library to create a simulated network with white traffic and attacks and perform packet captures on links.