Attack Simulations
This section documents the attack scenarios used to generate malicious traffic within the VNTD environment.
These simulations allow the monitoring infrastructure to generate real detection events, which can later be analyzed through the monitoring stack.
Objectives
Attack scenarios serve several purposes:
- Validate IDS detection capabilities.
- Generate labeled benign and malignant events
- Evaluate monitoring stack.
- Provide datasets for machine learning analysis.
Planned Scenarios
The following attack simulations will be implemented:
Each attack will include:
- Execution methodology.
- Expected network behavior.
- IDS detection results.
- Generated logs.