ATTENTION/WARNING - NE PAS DÉPOSER ICI/DO NOT SUBMIT HERE

Ceci est la version de TEST de DIAL.mem. Veuillez ne pas soumettre votre mémoire sur ce site mais bien à l'URL suivante: 'https://thesis.dial.uclouvain.be'.
This is the TEST version of DIAL.mem. Please use the following URL to submit your master thesis: 'https://thesis.dial.uclouvain.be'.
 

Attack simulation for post mortem forensic training networks security

(2020)

Files

Beckers_65581700_Beugoms_65351400_2020.pdf
  • UCLouvain restricted access
  • Adobe PDF
  • 5.38 MB

Beckers_65581700_Beugoms_65351400_2020_Appendix1.zip
  • UCLouvain restricted access
  • Unknown
  • 7.48 MB

Details

Supervisors
Faculty
Degree label
Abstract
When a network attack occurred it leaves some data in the packets emitted we can identify as suspect activity. It is then interesting to have some samples of packet captures of a network making traffic from classic users considered as white traffic and traffic from an attacker considered as malicious one. Theses captures are very useful when learning or designing a software to recognize the white traffic or/and the traffic provided by the attacker(s). Some tools are available to generate captures like .pcap files from a simulated network but it required a lot of installations and configurations that can result to a lot of time lost. Thus we develop a solution in Python that can be used like a library to create a simulated network with white traffic and attacks and perform packet captures on links.