Goto

Collaborating Authors

Introduction to Network Emulation - Programmer Books

#artificialintelligence

Emulation is a hybrid experimentation technique intended to bridge the gap between simulation and real-world testing. The key idea of emulation is to reproduce in real time and in a controlled manner the essential functionality of a system, so that it can interact with other real systems that can thus be evaluated. This book describes the technique of network emulation and compares it with the other experimental approaches: the scholarly analytical modeling, the popular network simulation, and the demanding real-world testing. To emphasize the practical aspects related to emulation, this book presents a large number of examples of network emulators on the market, as well as provides an in-depth analysis of a case study, the wireless network emulation testbed called QOMB.


MITRE releases emulation plan for FIN6 hacking group, more to follow

ZDNet

Simple steps can make the difference between losing your online accounts or maintaining what is now a precious commodity: Your privacy. MITRE and cyber-security industry partners have launched a new project that promises to offer free emulation plans that mimic today's biggest hacking groups in order to help train security teams to defend their networks. Named the Adversary Emulation Library, the project is the work of the MITRE Engenuity's Center for Threat-Informed Defense. The project, hosted on GitHub, aims to provide free-to-download emulation plans. Emulation plans are a collection of step-by-step guides, scripts, and commands that describe and perform malicious operations commonly observed in the playbook of a specific adversary.


Not All Sandboxes Are Created Equal

#artificialintelligence

Sandbox environments are a common feature of many cybersecurity solutions in their fight against advanced malware. Firewalls, endpoint protection, and even next-generation machine learning systems use sandboxes as one of their lines of defense. However, not all sandboxes are created equal. Sandboxes can take different approaches towards malware analysis and detection, and some of these approaches are clearly more effective than others. New strains of malware are designed to evade the detection techniques used by older sandboxes, rendering them largely ineffective.


Not All Sandboxes Are Created Equal

#artificialintelligence

Sandbox environments are a common feature of many cybersecurity solutions in their fight against advanced malware. Firewalls, endpoint protection, and even next-generation machine learning systems use sandboxes as one of their lines of defense. However, not all sandboxes are created equal. Sandboxes can take different approaches towards malware analysis and detection, and some of these approaches are clearly more effective than others. New strains of malware are designed to evade the detection techniques used by older sandboxes, rendering them largely ineffective.


RK2020 handheld emulator review: Dreamcast games in your pocket

PCWorld

There's never been a better time to be a retro gamer, especially if you want to carry the classics around in your pocket. The RK2020 from RK Console is yet another in a long line of handheld emulation devices that plays games from a wide range of classic consoles. While RK2020 plays everything from NES to PS1 with ease thanks to powerful hardware, it falls just short on Dreamcast and PSP emulation. The RK2020 comes in three different case variations and the pricing can be found as low as $70--which is the highest-priced device like this I've tested so far. Despite those minor drawbacks, this is one of the best handheld emulators you can buy, and it's become my go-to device for retro gaming in the palm of my hand.