Requirements for Crafting Virtual Network Packet Captures
Abstract
:1. Introduction
- Use of real networks,
- Creation of a honeynet,
- Use of a network simulator,
- Existing traffic dumps,
- Use of network traffic generators,
- Combining the aforementioned techniques.
the result of time-stamped series of packets arriving and departing from particular network interfaces with realistic values.
- An analysis of relevant features in traffic from virtualised networks and subsequently the derivation of a set of requirements, which is as complete as possible, as a baseline for a packet generation process targeted towards virtual environments;
- The extension of the Encapcap tool to meet the above requirements;
- The presentation and evaluation of different use cases with the help of (extended) Encapcap.
2. Related Work
3. Requirements
3.1. Correctness
3.2. RFC Compatibility
3.3. Flexibility
3.4. Adaptability
3.5. Reproducability
3.6. Randomisation
3.7. Performance
3.8. Precision
3.9. Awareness
3.10. Extending Encapcap
4. Use Cases
4.1. Training
4.2. Testing
4.3. Security
4.4. Relation to Requirements
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Mahalingam, M.; Dutt, D.; Duda, K.; Agarwal, P.; Kreeger, L.; Sridhar, T.; Bursell, M.; Wright, C. Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks. RFC 7348, 2014. Available online: https://datatracker.ietf.org/doc/rfc7348/ (accessed on 8 May 2022).
- Garg, P.; Wang, Y.S. NVGRE: Network Virtualization Using Generic Routing Encapsulation. RFC 7637, 2015. Available online: https://datatracker.ietf.org/doc/rfc7637/ (accessed on 8 May 2022).
- Kantor, B. Internet Protocol Encapsulation of AX.25 Frames. RFC 1226, 1991. Available online: https://datatracker.ietf.org/doc/rfc1226/ (accessed on 8 May 2022).
- Simpson, W.A. The Point-to-Point Protocol (PPP). RFC 1661, 1994. Available online: https://datatracker.ietf.org/doc/rfc1661/ (accessed on 8 May 2022).
- Mousavi, S.M.; St-Hilaire, M. Early detection of DDoS attacks against SDN controllers. In Proceedings of the 2015 International Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA, 16–19 February 2015; pp. 77–81. [Google Scholar]
- Aljuhani, A.; Alharbi, T. Virtualized Network Functions security attacks and vulnerabilities. In Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 9–11 January 2017; pp. 1–4. [Google Scholar]
- Kotenko, I.; Chechulin, A.; Branitskiy, A. Generation of source data for experiments with network attack detection software. In Proceedings of the Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2017; Volume 820, p. 012033. [Google Scholar]
- Du, X.; Hargreaves, C.; Sheppard, J.; Scanlon, M. TraceGen: User Activity Emulation for Digital Forensic Test Image Generation. Forensic Sci. Int. Digit. Investig. 2020, 38, 301133. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Hakak, S.; Ghorbani, A.A. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy. In Proceedings of the International Carnahan Conference on Security Technology (ICCST), Chennai, India, 1–3 October 2019; pp. 1–8. [Google Scholar]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the ICISSp, Funchal, Portugal, 22–24 January 2018; pp. 108–116. [Google Scholar]
- Rajasinghe, N.; Samarabandu, J.; Wang, X. INSecS-DCS: A highly customizable network intrusion dataset creation framework. In Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), Quebec City, QC, USA, 13–16 May 2018; pp. 1–4. [Google Scholar]
- Vishwanath, K.V.; Vahdat, A. Realistic and Responsive Network Traffic Generation. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Pisa, Italy, 11–15 September 2006; Association for Computing Machinery: New York, NY, USA, 2006; pp. 111–122. [Google Scholar] [CrossRef]
- Voyiatzis, A.G.; Katsigiannis, K.; Koubias, S. A Modbus/TCP fuzzer for testing internetworked industrial systems. In Proceedings of the 20th Conference on Emerging Technologies & Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–6. [Google Scholar]
- Li, Y.; Miao, R.; Alizadeh, M.; Yu, M. DETER: Deterministic TCP Replay for Performance Diagnosis. In Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19), Boston, MA, USA, 26–28 February 2019; pp. 437–452. [Google Scholar]
- Padman, V.; Memon, N. Design of a virtual laboratory for information assurance education and research. In Proceedings of the Workshop on Information Assurance and Security, West Point, NY, USA, 1–3 June 2002; Volume 1, p. 1555. [Google Scholar]
- Son, J.; Irrechukwu, C.; Fitzgibbons, P. Virtual lab for online cyber security education. Commun. Iima 2012, 12, 5. [Google Scholar]
- Corey, V.; Peterman, C.; Shearin, S.; Greenberg, M.S.; Van Bokkelen, J. Network forensics analysis. IEEE Int. Comput. 2002, 6, 60–66. [Google Scholar] [CrossRef]
- Spiekermann, D.; Keller, J. Impact of Virtual Networks on Anomaly Detection with Machine Learning. In Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium, 29 June–3 July 2020; pp. 430–436. [Google Scholar] [CrossRef]
- Trabelsi, Z.; Alketbi, L. Using network packet generators and snort rules for teaching denial of service attacks. In Proceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education, England, UK, 1–3 July 2013; pp. 285–290. [Google Scholar]
- Spiekermann, D.; Keller, J. Encapcap: Transforming Network Traces to Virtual Networks. In Proceedings of the 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), Tokyo, Japan, 28 June–2 July 2021; pp. 437–442. [Google Scholar]
- Emmerich, P.; Gallenmüller, S.; Raumer, D.; Wohlfart, F.; Carle, G. Moongen: A scriptable high-speed packet generator. In Proceedings of the 2015 Internet Measurement Conference, Tokyo, Japan, 28–30 October 2015; pp. 275–287. [Google Scholar]
- Olsson, R. Pktgen the linux packet generator. In Proceedings of the Linux Symposium, Ottawa, Canada, 22–25 July 2005; Volume 2, pp. 11–24. [Google Scholar]
- Sanlı, M.; Schmidt, E.G.; Güran, H.C. FPGEN: A fast, scalable and programmable traffic generator for the performance evaluation of high-speed computer networks. Perform. Eval. 2011, 68, 1276–1290. [Google Scholar] [CrossRef]
- Kent, S.; Atkinson, R. IP Encapsulating Security Payload (ESP). RFC 2406, 1991. Available online: https://datatracker.ietf.org/doc/html/rfc2406 (accessed on 8 May 2022).
- Worster, T.; Rekhter, Y.; Rosen, E. Encapsulating MPLS in IP or Generic Routing Encapsulation (GRE). RFC 4023, 2005. Available online: https://datatracker.ietf.org/doc/rfc4023/ (accessed on 8 May 2022).
- Chowdhury, N.M.K.; Boutaba, R. A survey of network virtualization. Comput. Net. 2010, 54, 862–876. [Google Scholar] [CrossRef]
- Hausenblas, M. Container Networking; O’Reilly Media, Incorporated: Sebastopol, CA, USA, 2018. [Google Scholar]
- Botez, R.; Costa-Requena, J.; Ivanciu, I.A.; Strautiu, V.; Dobrota, V. SDN-Based Network Slicing Mechanism for a Scalable 4G/5G Core Network: A Kubernetes Approach. Sensors 2021, 21, 3773. [Google Scholar] [CrossRef] [PubMed]
- Spiekermann, D.; Keller, J. Wiretapping Pods and Nodes-Lawful Interception in Kubernetes. Electron. Commun. EASST 2021, 80. [Google Scholar] [CrossRef]
- Spiekermann, D.; Keller, J.; Eggendorfer, T. Network forensic investigation in OpenFlow networks with ForCon. Digit. Investig. 2017, 20, S66–S74. [Google Scholar] [CrossRef]
- Al-Hadhrami, Y.; Hussain, F.K. Real time dataset generation framework for intrusion detection systems in IoT. Future Gener. Comput. Syst. 2020, 108, 414–423. [Google Scholar] [CrossRef]
- Belenko, V.; Krundyshev, V.; Kalinin, M. Synthetic datasets generation for intrusion detection in VANET. In Proceedings of the 11th International Conference on Security of Information and Networks, Cardiff, UK, 10–12 September 2018; pp. 1–6. [Google Scholar]
- Botta, A.; Dainotti, A.; Pescapé, A. Do you trust your software-based traffic generator? IEEE Commun. Mag. 2010, 48, 158–165. [Google Scholar] [CrossRef] [Green Version]
- Feng, W.c.; Goel, A.; Bezzaz, A.; Feng, W.c.; Walpole, J. TCPivo: A High-Performance Packet Replay Engine. In Proceedings of the ACM SIGCOMM Workshop on Models, Methods and Tools for Reproducible Network Research, Karlsruhe, Germany, 25–27 August 2003; Association for Computing Machinery: New York, NY, USA, 2003; pp. 57–64. [Google Scholar] [CrossRef]
- Wundsam, A.; Levin, D.; Seetharaman, S.; Feldmann, A. OFRewind: Enabling record and replay troubleshooting for networks. In Proceedings of the USENIX Annual Technical Conference, Portland, OR, USA, 15–17 June 2011; USENIX Association: Berkeley, CA, USA, 2001; pp. 327–340. [Google Scholar]
- Parry, J.; Hunter, D.; Radke, K.; Fidge, C. A network forensics tool for precise data packet capture and replay in cyber-physical systems. In Proceedings of the Australasian Computer Science Week Multiconference, Canberra, Australia, 2–5 February 2016; pp. 1–10. [Google Scholar]
- Emmerich, P.; Gallenmüller, S.; Antichi, G.; Moore, A.W.; Carle, G. Mind the gap-a comparison of software packet generators. In Proceedings of the 2017 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), Beijing, China, 18–19 May 2017; pp. 191–203. [Google Scholar]
- Gallenmüller, S.; Scholz, D.; Stubbe, H.; Carle, G. The pos framework: A methodology and toolchain for reproducible network experiments. In Proceedings of the 17th International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’21), Munich, Germany, 7–10 December 2021; pp. 259–266. [Google Scholar]
- Network Functions Virtualisation (NFV) Release 3; Testing; Specification of Networking Benchmarks and Measurement Methods for NFVI. Standard, European Telecommunications Standards Institute: Sophia Antipolis, France, 2020.
- Pezzè, M.; Young, M. Software Testing and Analysis—Process, Principles and Techniques; Wiley: Hoboken, NJ, USA, 2007. [Google Scholar]
- Vömel, S.; Freiling, F.C. Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition. Digit. Investig. 2012, 9, 125–137. [Google Scholar] [CrossRef]
- Soltanian, M.R.K.; Amiri, I.S. Chapter 4—Results and Discussions. In Theoretical and Experimental Methods for Defending Against DDOS Attacks; Soltanian, M.R.K., Amiri, I.S., Eds.; Syngress: Waltham, MA, USA, 2016; pp. 47–56. [Google Scholar] [CrossRef]
- Li, T.; Farinacci, D.; Hanks, S.P.; Meyer, D.; Traina, P.S. Generic Routing Encapsulation (GRE). RFC 2784. Available online: https://dl.acm.org/doi/10.17487/RFC2784 (accessed on 8 May 2022).
- Dommety, G. Key and Sequence Number Extensions to GRE. RFC 2890. Available online: https://datatracker.ietf.org/doc/html/rfc2890 (accessed on 8 May 2022).
- Moch, C.; Freiling, F.C. Evaluating the forensic image generator generator. In Proceedings of the International Conference on Digital Forensics and Cyber Crime, Dublin, Ireland, 26–28 October 2011; Springer: Berlin/Heidelberg, Germany, 2011; pp. 238–252. [Google Scholar]
- Tang, D.; Pham, C.; Chinen, K.i.; Beuran, R. Interactive cybersecurity defense training inspired by web-based learning theory. In Proceedings of the 2017 IEEE 9th International Conference on Engineering Education (ICEED), Kanazawa, Japan, 9–10 November 2017; pp. 90–95. [Google Scholar]
- Torten, R.; Reaiche, C.; Boyle, S. The impact of security awarness on information technology professionals’ behavior. Comput. Secur. 2018, 79, 68–79. [Google Scholar] [CrossRef]
- Pan, L.; Batten, L. Reproducibility of digital evidence in forensic investigations. In Proceedings of the 5th Annual Digital Forensic Research Conference (DFRWS 2005), New Orleans, LA, USA, 17–19 August 2005; pp. 1–8. [Google Scholar]
- Spiekermann, D. FAP: Design of an Architecture of a Forensic Access Point to Perform Online Access in a Forensically Sound Manner. In Proceedings of the European Interdisciplinary Cybersecurity Conference, Rennes, France, 18 November 2020; pp. 1–6. [Google Scholar]
- Kneusel, R.T. Random Numbers and Computers; Springer: Berlin/Heidelberg, Germany, 2018. [Google Scholar]
- Gallenmüller, S.; Emmerich, P.; Raumer, D.; Carle, G. Moongen: Software Packet Generation for 10 Gbit and Beyond; USENIX NSDI: Oakland, CA, USA, 2015. [Google Scholar]
- Covington, G.A.; Gibb, G.; Lockwood, J.W.; McKeown, N. A packet generator on the NetFPGA platform. In Proceedings of the 17th IEEE Symposium on Field Programmable Custom Computing Machines, Napa, CA, USA, 5–7 April 2009; IEEE: New York, NY, USA, 2009; pp. 235–238. [Google Scholar]
- Kawashima, R.; Matsuo, H. Implementation and Performance Analysis of STT Tunneling Using vNIC Offloading Framework (CVSW). In Proceedings of the 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, Singapore, 15–18 December 2014; pp. 929–934. [Google Scholar]
- Prechelt, L. An empirical comparison of c, c++, java, perl, python, rexx and tcl. IEEE Comput. 2000, 33, 23–29. [Google Scholar] [CrossRef] [Green Version]
- John, W.; Tafvelin, S. Analysis of internet backbone traffic and header anomalies observed. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, San Diego, CA, USA, 24–26 October 2007; pp. 111–116. [Google Scholar]
- Bittau, A. The fragmentation attack in practice. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 8–11 May 2005; IEEE Computer Society: Washington, DC, USA, 2005. [Google Scholar]
- Mazurczyk, W.; Szary, P.; Wendzel, S.; Caviglione, L. Towards reversible storage network covert channels. In Proceedings of the 14th International Conference on Availability, Reliability and Security, Canterbury, UK, 26–29 August 2019; pp. 1–8. [Google Scholar]
- Spiekermann, D.; Keller, J.; Eggendorfer, T. Towards Covert channels in cloud environments: A study of implementations in virtual networks. In Proceedings of the International Workshop on Digital Watermarking, Magdeburg, Germany, 23–25 August 2017; Springer: Berlin/Heidelberg, Germany, 2017; pp. 248–262. [Google Scholar]
- Sanders, C. Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems; No Starch Press: San Francisco, CA, USA, 2017. [Google Scholar]
- IEEE Std-802.3-2005 (Revision IEEE Std-802.3-2002 including all approved amendments); IEEE Standard for Information Technology—Telecommunications and Information Exchange Between Systems—Local and Metropolitan Area Networks—Specific Requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications. IEEE: Piscataway, NJ, USA, 2005. [CrossRef]
- Ivanova, M.E.; Dushkin, A.V.; Bryushinin, A.O. Method of Fuzzing Testing of Firewalls Using the Gray Box Method. In Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), St. Petersburg and Moscow, Russia, 26–28 January 2021; p. 2340. [Google Scholar] [CrossRef]
Use Case 1 | Use Case 2 | Use Case 3 | |
---|---|---|---|
Requirements | Training | Testing | Security |
Correctness | x | x | x |
RFC compatibility | x | - | - |
Flexibility | x | - | x |
Adaptability | x | x | x |
Reproducability | x | x | x |
Randomisation | - | - | x |
Performance | - | x | - |
Precision | x | x | - |
Awareness | - | x | x |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Spiekermann, D.; Keller, J. Requirements for Crafting Virtual Network Packet Captures. J. Cybersecur. Priv. 2022, 2, 516-526. https://doi.org/10.3390/jcp2030026
Spiekermann D, Keller J. Requirements for Crafting Virtual Network Packet Captures. Journal of Cybersecurity and Privacy. 2022; 2(3):516-526. https://doi.org/10.3390/jcp2030026
Chicago/Turabian StyleSpiekermann, Daniel, and Jörg Keller. 2022. "Requirements for Crafting Virtual Network Packet Captures" Journal of Cybersecurity and Privacy 2, no. 3: 516-526. https://doi.org/10.3390/jcp2030026
APA StyleSpiekermann, D., & Keller, J. (2022). Requirements for Crafting Virtual Network Packet Captures. Journal of Cybersecurity and Privacy, 2(3), 516-526. https://doi.org/10.3390/jcp2030026