Network Simulation with Complex Cyber-attack Scenarios

Tiago Dias,João Vitorino,Eva Maia,Isabel Praça
2024-12-02
Abstract:Network Intrusion Detection (NID) systems can benefit from Machine Learning (ML) models to detect complex cyber-attacks. However, to train them with a great amount of high-quality data, it is necessary to perform reliable simulations of multiple interacting machines. This paper presents a network simulation solution for the creation of NID datasets with complex attack scenarios. This solution was integrated in the Airbus CyberRange platform to benefit from its simulation capabilities of generating benign and malicious traffic patterns that represent realistic cyber-attacks targeting a computer network. A realistic vulnerable network topology was configured in the CyberRange and three different attack scenarios were implemented: Man-in-the-Middle (MitM), Denial-of-Service (DoS), and Brute-Force (BF).
Cryptography and Security
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the limitations of Network Intrusion Detection (NID) systems in the face of complex network attacks. Traditional NID systems are constructed based on known rules, are easily bypassed by malicious attackers, and require a great deal of analysis by domain experts. In order to improve the detection ability and adaptability of NID systems, Machine Learning (ML) models show great potential, being able to learn complex network features and detect complex network attacks, even zero - day attacks. However, these ML models require a large amount of high - quality data for effective training, and obtaining this data from actual computer networks often has the problems of being missing or corrupted. Therefore, the paper proposes a network simulation solution, aiming to generate NID datasets containing complex attack scenarios by simulating multiple interacting machines. This solution is integrated into the Airbus CyberRange platform, using its powerful simulation capabilities to generate benign traffic and malicious traffic patterns representing real - network attacks. Specifically, the paper configures a realistic vulnerable network topology and implements three different attack scenarios: Man - in - the - Middle (MitM), Denial - of - Service (DoS), and Brute - Force (BF). The implementation of these attack scenarios helps to generate more realistic and complex NID datasets, thereby enhancing the training effect and generalization ability of ML models.