WordNet: a lexical database for English
Communications of the ACM
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Data Mining Meets Performance Evaluation: Fast Algorithms for Modeling Bursty Traffic
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Self-configuring network traffic generation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
A framework for malicious workload generation
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
BLINC: multilevel traffic classification in the dark
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
SWORD: scalable and flexible workload generator for distributed data processing systems
Proceedings of the 38th conference on Winter simulation
ICSC '07 Proceedings of the International Conference on Semantic Computing
Unconstrained endpoint profiling (googling the internet)
Proceedings of the ACM SIGCOMM 2008 conference on Data communication
Evaluating distributed systems: does background traffic matter?
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Application-level simulation for network security
Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops
Context aware recommendations for user-generated content on a social network site
Proceedings of the seventh european conference on European interactive television conference
Swing: realistic and responsive network traffic generation
IEEE/ACM Transactions on Networking (TON)
Toward instrumenting network warfare competitions to generate labeled datasets
CSET'09 Proceedings of the 2nd conference on Cyber security experimentation and test
Efficient and realistic generation of IP addresses
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Simulating content in traffic for benchmarking intrusion detection systems
Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques
Hi-index | 0.00 |
Generating application-level content within network simulations and/or testbed environments tends toward an ad-hoc process reliant primarily on evaluator expertise. Such ad-hoc approaches are laborious and often fail to capture important aspects of how content is distributed within traffic. Further, while many tools allow for the generation of a wide-range of content types, there exists no coherent model for populating these tools with the necessary data. In this work, we create a content generative model for identifying, harvesting, and assigning application-level content to simulated traffic. This model ties consumers of content to the producers of the content as well as to a particular content category. This approach then allows for said content to be tied to a workload generator or simulator of choice to evaluate a given network application.