{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,16]],"date-time":"2025-12-16T12:22:09Z","timestamp":1765887729120,"version":"3.40.3"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319231259"},{"type":"electronic","value":"9783319231266"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23126-6_23","type":"book-chapter","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T13:20:51Z","timestamp":1439385651000},"page":"254-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise"],"prefix":"10.1007","author":[{"given":"Tero","family":"Kokkonen","sequence":"first","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Silokunnas","sequence":"additional","affiliation":[]},{"given":"Jarmo","family":"Siltanen","sequence":"additional","affiliation":[]},{"given":"Mikhail","family":"Zolotukhin","sequence":"additional","affiliation":[]},{"given":"Mikko","family":"Neijonen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"key":"23_CR1","unstructured":"JAMK University of Applied Sciences, Jyv\u00e4skyl\u00e4 Security Technology (JYVSECTEC), Realistic Global Cyber Environment (RGCE). http:\/\/www.jyvsectec.fi\/en\/rgce\/"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T., Kokkonen, T., Siltanen, J.: Analysis of HTTP requests for anomaly detection of web attacks. In: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, pp. 406\u2013411, August 2014","DOI":"10.1109\/DASC.2014.79"},{"issue":"4","key":"23_CR3","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/90.944338","volume":"9","author":"S Floyd","year":"2001","unstructured":"Floyd, S., Paxson, V.: Difficulties in Simulating the Internet. IEEE\/ACM Trans. Netw. 9(4), 392\u2013403 (2001)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"6","key":"23_CR4","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1109\/4234.929610","volume":"5","author":"E Casilari","year":"2001","unstructured":"Casilari, E., Gonzblez, F.J., Sandoval, F.: Modeling of HTTP traffic. Communications Letters, IEEE 5(6), 272\u2013274 (2001)","journal-title":"Communications Letters, IEEE"},{"issue":"15","key":"23_CR5","doi-asserted-by":"publisher","first-page":"3531","DOI":"10.1016\/j.comnet.2012.02.019","volume":"14","author":"A Botta","year":"2012","unstructured":"Botta, A., Dainotti, A., Pescap\u00e8, A.: A tool for the generation of realistic network workload for emerging networking scenarios. Computer Networks (Elsevier) 14(15), 3531\u20133547 (2012)","journal-title":"Computer Networks (Elsevier)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/11663812_13","volume-title":"Recent Advances in Intrusion Detection","author":"S-S Hong","year":"2006","unstructured":"Hong, S.-S., Wu, S.: On interactive internet traffic replay. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 247\u2013264. Springer, Heidelberg (2006)"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Pries, R., Wamser, F., Staehle, D., Heck, K., Tran-Gia, P.: On traffic characteristics of a broadband wireless internet access. In: Next Generation Internet Networks, NGI 2009, pp. 1\u20137, July 2009","DOI":"10.1109\/NGI.2009.5175772"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Li, T., Liu, J., Lei, Z., Xie, Y.: Characterizing service providers traffic of mobile internet services in cellular data network. In: 2013 5th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC), vol. 1, pp. 134\u2013139, August 2013","DOI":"10.1109\/IHMSC.2013.39"},{"key":"23_CR9","unstructured":"The University of Southern California (USC-ISI), The Information Sciences Institute, TG Traffic Generation Tool. http:\/\/www.postel.org\/tg\/"},{"key":"23_CR10","unstructured":"The University of Kansas, The Information and Telecommunication Technology Center (ITTC), NetSpec Tool. http:\/\/www.ittc.ku.edu\/netspec\/"},{"key":"23_CR11","unstructured":"Netperf. http:\/\/www.netperf.org\/netperf\/"},{"key":"23_CR12","unstructured":"pksh -the Packet Shell. http:\/\/tecsiel.it\/pksh\/index.html"},{"key":"23_CR13","unstructured":"Universita\u2019 degli Studi di Napoli \u201cFederico II\u201d, D-ITG, Distributed Internet Traffic Generator. http:\/\/traffic.comics.unina.it\/software\/ITG\/"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Angrisani, L., Botta, A., Miele, G., Vadursi, M.: An experimental characterization of the internal generation cycle of an open-source software traffic generator. In: 2013 IEEE International Workshop on Measurements and Networking Proceedings (M N), pp. 74\u201378, October 2013","DOI":"10.1109\/IWMN.2013.6663780"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Botta, A., Dainotti, A., Pescap\u00e8, A.: Do You Trust Your Software-Based Traffic Generator. IEEE Communications Magazine, 158\u2013165 (2010)","DOI":"10.1109\/MCOM.2010.5560600"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"White, B., et al.: An integrated experimental environment for distributed systems and networks. In: Proceedings of the 5th Symposium on Operating Systems Design and Implementation, 2002. USENIX Association, December 2002","DOI":"10.1145\/1060289.1060313"},{"key":"23_CR17","unstructured":"Kleen, A.: Linux Programmer\u2019s Manual RAW(7). http:\/\/www.manpages.info\/linux\/raw.7.html"},{"key":"23_CR18","unstructured":"Kleen, A., Singhvi, N., Kuznetsov\u2019s, A.: Linux Programmer\u2019s Manual TCP(7). http:\/\/www.manpages.info\/linux\/tcp.7.html"},{"key":"23_CR19","unstructured":"Postel, J.: Transmission Control Protocol. RFC 793 (INTERNET STANDARD). Updated by RFCs 1122, 3168, 6093, 6528. Internet Engineering Task Force, September 1981. http:\/\/www.ietf.org\/rfc\/rfc793.txt"},{"key":"23_CR20","unstructured":"Tanase, M.: IP Spoofing: An Introduction. The Security Blog, March 2003. http:\/\/www.symantec.com\/connect\/articles\/ip-spoofing-introduction"},{"key":"23_CR21","unstructured":"WireShark Wiki, Libpcap File Format. http:\/\/wiki.wireshark.org\/Development\/LibpcapFileFormat\/"},{"key":"23_CR22","unstructured":"Tcpreplay. http:\/\/tcpreplay.synfin.net\/"},{"key":"23_CR23","unstructured":"Khayari, R.E.A., R\u00fccker, M., Lehman, A., Musovic, A.: ParaSynTG: a parameterized synthetic trace generator for representation of WWW traffic. In: SPECTS (2008), pp. 317\u2013323, June 16-18, 2008"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Postel, J.: User Datagram Protocol. RFC 768 (INTERNET STANDARD). Internet Engineering Task Force, August 1980. http:\/\/www.ietf.org\/rfc\/rfc768.txt","DOI":"10.17487\/rfc0768"},{"key":"23_CR25","unstructured":"The GO Programming Language. https:\/\/golang.org\/"},{"issue":"8","key":"23_CR26","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1145\/359576.359585","volume":"21","author":"CAR Hoare","year":"1978","unstructured":"Hoare, C.A.R.: Communicating Sequential Processess. Communications of the ACM 21(8), 666\u2013677 (1978)","journal-title":"Communications of the ACM"},{"key":"23_CR27","unstructured":"Fette, I., Melnikov, A.: WebSocket Protocol. RFC 6455 (INTERNET STANDARD). Internet Engineering Task Force, December 2011. http:\/\/www.ietf.org\/rfc\/rfc6455.txt"},{"key":"23_CR28","unstructured":"Ministry of defense press release May 8, 2013. Cyber Security Exercise in Jyv\u00e4skyl\u00e4, May 13\u201317, 2013. Kyberturvallisuusharjoitus Jyv\u00e4skyl\u00e4ss\u00e4, May 13\u201317, 2013. http:\/\/www.defmin.fi\/ajankohtaista\/tiedotteet\/2013\/kyberturvallisuusharjoitus_jyvaskylassa_13.-17.5.2013.5502.news"},{"key":"23_CR29","unstructured":"Finnish Defence Forces Press Release, June 3, 2014, Performance of Cyber Security is developed by co-operation between Government Authorities and University. Kyber-suorituskyky\u00e4 hiotaan viranomaisten ja korkeakoulujen yhteisty\u00f6ll\u00e4. http:\/\/www.fdf.fi\/wcm\/su+puolustusvoimat.fi\/pv.fi+staattinen+sivusto+su\/puolustusvoimat\/tiedotteet\/kybersuorituskykya+hiotaan+viranomaisten+ja+korkeakoulujen+yhteistyolla"},{"key":"23_CR30","unstructured":"Luo, S., Marin, G.A.: Realistic Internet traffic simulation through mixture modeling and a case study. In: Proceedings of the 2005 Winter Simulation Conference, pp. 2408\u20132416, December 4\u20137, 2005"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23126-6_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T11:43:43Z","timestamp":1676029423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23126-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319231259","9783319231266"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23126-6_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}