This project demonstrates the generation of network traffic in a controlled lab environment using Python and Scapy. It includes:
- TCP SYN packet burst simulation
- UDP traffic generation with random payloads
- Use of randomized IPs and ports to mimic real-world traffic patterns
The project is strictly designed for educational and cybersecurity lab use only.
This project must only be executed in:
- Isolated virtual environments (e.g., Kali Linux + Metasploitable)
- Authorized lab setups
Unauthorized use on public networks is illegal.
- Python 3
- Scapy
- Kali Linux (recommended)
- VirtualBox / VMware
├── syn_burst_simulation.py ├── udp_traffic_generator.py └── README.md
- Generates TCP SYN packets
- Randomizes source IP and port
- Simulates traffic bursts with delay control
- Sends UDP packets with random payload
- Uses randomized ports and IP addresses
- Helps in traffic pattern observation
-
Simulates TCP SYN packet flow
-
Useful for understanding:
- TCP handshake behavior
- Traffic burst patterns
-
Generates UDP packets continuously
-
Includes random payload generation
-
Useful for:
- Network monitoring
- Flow analysis
pip install scapypython syn_burst_simulation.pypython udp_traffic_generator.py- Cybersecurity lab testing
- Network traffic analysis
- IDS/IPS testing
- Packet flow observation
- Packet crafting
- TCP/UDP protocols
- Traffic simulation
- Network flow behavior
- Integration with CICIDS2017 dataset features
- Flow-based feature extraction
- ML model integration for attack detection
- Real-time visualization dashboard
Bhavya Jain
Feel free to fork and improve the project for educational purposes.