MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • Research Computing
  • AIA
  • Reports
  • View Item
  • DSpace@MIT Home
  • Research Computing
  • AIA
  • Reports
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Synthetic Network Data Generation for Analyst Training

Author(s)
Smith, Liam; Wright, Matthew
Thumbnail
DownloadMain Report (244.2Kb)
Metadata
Show full item record
Abstract
Rapidly evolving cyber threats demand continuous, high-fidelity training for defense analysts. However, generating realistic network traffic datasets creates a significant barrier to entry, often requiring extensive virtualization infrastructure, specialized hardware, and knowledge in cyber range administration. This paper introduces a streamlined architecture, called Generative Packet Captures (GenCap), built upon the foundational capabilities of the FOSR benign traffic generator and the ID2T attack injector. By abstracting these complex tools behind an automated orchestration layer, it enables users to generate scenario-specific PCAP files on demand. This approach democratizes access to training data, allowing analysts to create rigorous network defense scenarios without the need for complex provisioning or systems engineering knowledge.
Date issued
2026-04-01
URI
https://hdl.handle.net/1721.1/165294
Department
Lincoln Laboratory
Keywords
PCAP (Packet Capture), IDS (Intrusion Detection System), RAG (Retrieval-Augmented Generation), Cyber Range, Large Language Models (LLMs)

Collections
  • Reports

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.