Skip to content

Attack Simulations

This section documents the attack scenarios used to generate malicious traffic within the VNTD environment.

These simulations allow the monitoring infrastructure to generate real detection events, which can later be analyzed through the monitoring stack.


Objectives

Attack scenarios serve several purposes:

  • Validate IDS detection capabilities.
  • Generate labeled benign and malignant events
  • Evaluate monitoring stack.
  • Provide datasets for machine learning analysis.

Planned Scenarios

The following attack simulations will be implemented:

Each attack will include:

  • Execution methodology.
  • Expected network behavior.
  • IDS detection results.
  • Generated logs.