SIGCOMM '95 Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Self-similarity in World Wide Web traffic: evidence and possible causes
IEEE/ACM Transactions on Networking (TON)
On power-law relationships of the Internet topology
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Code red worm propagation modeling and analysis
Proceedings of the 9th ACM conference on Computer and communications security
On the relationship between file sizes, transport protocols, and self-similar network traffic
ICNP '96 Proceedings of the 1996 International Conference on Network Protocols (ICNP '96)
BRITE: A Flexible Generator of Internet Topologies
BRITE: A Flexible Generator of Internet Topologies
Power laws and the AS-level internet topology
IEEE/ACM Transactions on Networking (TON)
A first-principles approach to understanding the internet's router-level topology
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
A first look at modern enterprise traffic
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
INFOCOM'96 Proceedings of the Fifteenth annual joint conference of the IEEE computer and communications societies conference on The conference on computer communications - Volume 2
Simulation of internet DDoS attacks and defense
ISC'06 Proceedings of the 9th international conference on Information Security
Large-scale evaluation of distributed attack detection
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
Distributed detection of large-scale attacks in the internet
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques
Anomaly-based identification of large-scale attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
An XCAST multicast implementation for the OverSim simulator
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
Policy-driven network simulation: a resilience case study
Proceedings of the 2011 ACM Symposium on Applied Computing
Future Generation Computer Systems
Quantitative simulation of XCAST6 performance using OMNeT++
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
Realistic underlays for overlay simulation
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Simulating large-scale dynamic random graphs in OMNeT++
Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques
Agent-based simulation of cooperative defence against botnets
Concurrency and Computation: Practice & Experience
Resilience strategies for networked malware detection and remediation
NSS'12 Proceedings of the 6th international conference on Network and System Security
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Hi-index | 0.00 |
During development of new protocols and systems researchers in most cases use simulations for evaluation of their product, especially in the area of communication networks. The quality of the simulation environment, however, significantly influences the quality of a product's evaluation. Therefore, simulation environments as realistic as possible are necessary in order to get reliable results. In this paper we present ReaSE, a tool for creation of such realistic environments. It considers multiple aspects: topology generation -- on AS level as well as on router level --, traffic patterns, and attack traffic. Furthermore, ReaSE is based on current state of the art solutions.