| dc.contributor.author | Smith, Liam | |
| dc.contributor.author | Wright, Matthew | |
| dc.date.accessioned | 2026-04-01T14:52:33Z | |
| dc.date.available | 2026-04-01T14:52:33Z | |
| dc.date.issued | 2026-04-01 | |
| dc.identifier.uri | https://hdl.handle.net/1721.1/165294 | |
| dc.description.abstract | Rapidly evolving cyber threats demand continuous,
high-fidelity training for defense analysts. However, generating
realistic network traffic datasets creates a significant barrier
to entry, often requiring extensive virtualization infrastructure,
specialized hardware, and knowledge in cyber range administration.
This paper introduces a streamlined architecture, called
Generative Packet Captures (GenCap), built upon the foundational
capabilities of the FOSR benign traffic generator and
the ID2T attack injector. By abstracting these complex tools
behind an automated orchestration layer, it enables users to
generate scenario-specific PCAP files on demand. This approach
democratizes access to training data, allowing analysts to create
rigorous network defense scenarios without the need for complex
provisioning or systems engineering knowledge. | en_US |
| dc.description.sponsorship | Department of the Air Force Artificial Intelligence Accelerator | en_US |
| dc.language.iso | en_US | en_US |
| dc.subject | PCAP (Packet Capture) | en_US |
| dc.subject | IDS (Intrusion Detection System) | en_US |
| dc.subject | RAG (Retrieval-Augmented Generation) | en_US |
| dc.subject | Cyber Range | en_US |
| dc.subject | Large Language Models (LLMs) | en_US |
| dc.title | Synthetic Network Data Generation for Analyst Training | en_US |
| dc.type | Technical Report | en_US |
| dc.contributor.department | Lincoln Laboratory | en_US |