Show simple item record

dc.contributor.authorSmith, Liam
dc.contributor.authorWright, Matthew
dc.date.accessioned2026-04-01T14:52:33Z
dc.date.available2026-04-01T14:52:33Z
dc.date.issued2026-04-01
dc.identifier.urihttps://hdl.handle.net/1721.1/165294
dc.description.abstractRapidly evolving cyber threats demand continuous, high-fidelity training for defense analysts. However, generating realistic network traffic datasets creates a significant barrier to entry, often requiring extensive virtualization infrastructure, specialized hardware, and knowledge in cyber range administration. This paper introduces a streamlined architecture, called Generative Packet Captures (GenCap), built upon the foundational capabilities of the FOSR benign traffic generator and the ID2T attack injector. By abstracting these complex tools behind an automated orchestration layer, it enables users to generate scenario-specific PCAP files on demand. This approach democratizes access to training data, allowing analysts to create rigorous network defense scenarios without the need for complex provisioning or systems engineering knowledge.en_US
dc.description.sponsorshipDepartment of the Air Force Artificial Intelligence Acceleratoren_US
dc.language.isoen_USen_US
dc.subjectPCAP (Packet Capture)en_US
dc.subjectIDS (Intrusion Detection System)en_US
dc.subjectRAG (Retrieval-Augmented Generation)en_US
dc.subjectCyber Rangeen_US
dc.subjectLarge Language Models (LLMs)en_US
dc.titleSynthetic Network Data Generation for Analyst Trainingen_US
dc.typeTechnical Reporten_US
dc.contributor.departmentLincoln Laboratoryen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record