{"id":"https://openalex.org/W7118165462","doi":"https://doi.org/10.3390/a19010043","title":"AgentRed: Towards an Agent-Based Approach to Automated Network Attack Traffic Generation","display_name":"AgentRed: Towards an Agent-Based Approach to Automated Network Attack Traffic Generation","publication_year":2026,"publication_date":"2026-01-04","ids":{"openalex":"https://openalex.org/W7118165462","doi":"https://doi.org/10.3390/a19010043"},"language":"en","primary_location":{"id":"doi:10.3390/a19010043","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a19010043","pdf_url":"https://www.mdpi.com/1999-4893/19/1/43/pdf","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-4893/19/1/43/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5098948816","display_name":"Koffi Anderson Koffi","orcid":"https://orcid.org/0009-0007-0622-9198"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Koffi Anderson Koffi","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018426144","display_name":"Kyle Lucke","orcid":null},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kyle Lucke","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121920483","display_name":"Elijah Danquah Darko","orcid":null},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elijah Danquah Darko","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121929569","display_name":"Tollan Berhanu","orcid":null},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tollan Berhanu","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112586897","display_name":"Robert Angelo Borrelli","orcid":null},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert Angelo Borrelli","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA","institution_ids":["https://openalex.org/I155093810"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088023851","display_name":"Constantinos Kolias","orcid":"https://orcid.org/0000-0002-3020-291X"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Constantinos Kolias","raw_affiliation_strings":["Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Idaho, Idaho Falls, ID 83402, USA","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5098948816"],"corresponding_institution_ids":["https://openalex.org/I155093810"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02093706,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"1","first_page":"43","last_page":"43"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3345000147819519,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.3345000147819519,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security Vulnerabilities","score":0.18719999492168427,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.08630000054836273,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scripting-language","display_name":"Scripting language","score":0.5717999935150146},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.4059999883174896},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.40290001034736633},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.4025999903678894},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.3822000026702881},{"id":"https://openalex.org/keywords/documentation","display_name":"Documentation","score":0.3720000088214874},{"id":"https://openalex.org/keywords/automation","display_name":"Automation","score":0.35600000619888306},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.33809998631477356}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8410999774932861},{"id":"https://openalex.org/C61423126","wikidata":"https://www.wikidata.org/wiki/Q187432","display_name":"Scripting language","level":2,"score":0.5717999935150146},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.4059999883174896},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.40290001034736633},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.4025999903678894},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.3822000026702881},{"id":"https://openalex.org/C56666940","wikidata":"https://www.wikidata.org/wiki/Q788790","display_name":"Documentation","level":2,"score":0.3720000088214874},{"id":"https://openalex.org/C115901376","wikidata":"https://www.wikidata.org/wiki/Q184199","display_name":"Automation","level":2,"score":0.35600000619888306},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3440000116825104},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.33809998631477356},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3109000027179718},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3107999861240387},{"id":"https://openalex.org/C79581498","wikidata":"https://www.wikidata.org/wiki/Q1367530","display_name":"Suite","level":2,"score":0.3009999990463257},{"id":"https://openalex.org/C59519942","wikidata":"https://www.wikidata.org/wiki/Q650665","display_name":"Drone","level":2,"score":0.28859999775886536},{"id":"https://openalex.org/C183469790","wikidata":"https://www.wikidata.org/wiki/Q333501","display_name":"Crash","level":2,"score":0.28369998931884766},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.2833000123500824},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.28290000557899475},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.2824999988079071},{"id":"https://openalex.org/C2776359362","wikidata":"https://www.wikidata.org/wiki/Q2145286","display_name":"Representation (politics)","level":3,"score":0.27889999747276306},{"id":"https://openalex.org/C80519477","wikidata":"https://www.wikidata.org/wiki/Q3532236","display_name":"Scenario testing","level":3,"score":0.2759000062942505},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.26600000262260437},{"id":"https://openalex.org/C201100257","wikidata":"https://www.wikidata.org/wiki/Q393287","display_name":"Network traffic control","level":3,"score":0.250900000333786}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/a19010043","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a19010043","pdf_url":"https://www.mdpi.com/1999-4893/19/1/43/pdf","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5ec9f219e1c54d9baafe84b3ed8969f8","is_oa":true,"landing_page_url":"https://doaj.org/article/5ec9f219e1c54d9baafe84b3ed8969f8","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Algorithms, Vol 19, Iss 1, p 43 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/a19010043","is_oa":true,"landing_page_url":"https://doi.org/10.3390/a19010043","pdf_url":"https://www.mdpi.com/1999-4893/19/1/43/pdf","source":{"id":"https://openalex.org/S190629608","display_name":"Algorithms","issn_l":"1999-4893","issn":["1999-4893"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Algorithms","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306111","display_name":"U.S. Department of Commerce","ror":"https://ror.org/04chq2495"},{"id":"https://openalex.org/F4320332178","display_name":"National Institute of Standards and Technology","ror":"https://ror.org/05xpvk416"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7118165462.pdf"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2107726111","https://openalex.org/W2111371783","https://openalex.org/W2807858273","https://openalex.org/W3100789280","https://openalex.org/W3158987539","https://openalex.org/W4322766882","https://openalex.org/W4387757573","https://openalex.org/W4391989542","https://openalex.org/W4409973220","https://openalex.org/W4411337269"],"related_works":[],"abstract_inverted_index":{"Network":[0],"security":[1,10],"tools":[2,229],"are":[3],"indispensable":[4],"in":[5,177,237],"testing":[6],"and":[7,26,48,56,87,96,108,118,138,146,196,198,226,260],"evaluating":[8],"the":[9,70,158,187,208,213,244,247,268,271,283,291,298,306],"of":[11,24,64,246,270,318],"computer":[12],"networks.":[13],"Existing":[14],"tools,":[15],"such":[16,42,92,230],"as":[17,43,93,231],"Hping3,":[18],"however,":[19],"offer":[20],"a":[21,58,109,126,147,154,178,238],"limited":[22],"set":[23],"options":[25,47],"attack-specific":[27],"configurations,":[28],"which":[29],"restrict":[30],"their":[31],"use":[32],"solely":[33],"to":[34,77,112,114,202,207,216,233,274,287,304],"well-known":[35],"attack":[36,132,194],"patterns.":[37,324],"Although":[38],"highly":[39],"parameterizable":[40],"libraries,":[41],"Scapy,":[44],"provide":[45],"more":[46],"scripting":[49],"capabilities,":[50],"they":[51],"require":[52,102],"extensive":[53,103],"manual":[54],"setup":[55,111],"often":[57],"steep":[59],"learning":[60],"curve.":[61],"The":[62],"development":[63],"powerful":[65],"AI":[66,144,299],"models,":[67],"capitalizing":[68],"on":[69,250],"transformer":[71],"architecture,":[72],"has":[73],"enabled":[74],"cybersecurity":[75],"researchers":[76],"develop":[78],"or":[79],"incorporate":[80],"these":[81],"models":[82,91],"into":[83,157],"existing":[84],"cyber-defense":[85],"systems":[86],"red-team":[88],"assessments.":[89],"Prominent":[90],"NetGPT,":[94],"TrafficFormer,":[95],"TrafficGPT":[97],"can":[98,172,184,223],"be":[99,224],"effective,":[100],"but":[101],"computational":[104],"resources":[105],"for":[106,129,193],"fine-tuning":[107],"complex":[110],"adapt":[113],"proprietary":[115],"networking":[116],"environments":[117],"protocols.":[119],"In":[120],"this":[121],"work,":[122],"we":[123],"propose":[124],"AgentRed,":[125],"lightweight":[127,166],"tool":[128,141,273],"generating":[130],"network":[131,159,180,204,253,277],"traffic":[133,160,175,205,220,236,311,323],"with":[134,151,279],"minimal":[135],"human":[136],"configuration":[137],"setup.":[139],"Our":[140,163,182,265],"integrates":[142],"an":[143,218,316],"agent":[145,183,300],"large":[148],"language":[149],"model":[150],"fewer":[152],"than":[153],"billion":[155],"parameters":[156],"generation":[161],"process.":[162],"method":[164,314],"creates":[165],"Low-Rank":[167],"Adaptation":[168],"(LoRA)":[169],"adapters":[170,201,215],"that":[171,222],"learn":[173],"specific":[174,206],"patterns":[176,195],"particular":[179],"environment.":[181,241],"autonomously":[185],"train":[186],"LoRA":[188,214,284,307],"adapters,":[189,285],"search":[190],"online":[191,302],"documentation":[192],"parameters,":[197],"select":[199],"appropriate":[200],"generate":[203,234,276],"user\u2019s":[209],"needs.":[210],"It":[211],"utilizes":[212],"create":[217],"intermediate":[219],"representation":[221],"parsed":[225],"executed":[227],"by":[228],"Scapy":[232],"malicious":[235],"virtualized":[239],"test":[240],"We":[242],"assess":[243],"performance":[245],"proposed":[248,272],"approach":[249],"six":[251],"popular":[252],"attacks,":[254,257],"including":[255],"flooding":[256],"Smurf,":[258],"Ping-of-Death,":[259],"normal":[261],"ICMP":[262],"ping":[263],"traffic.":[264],"results":[266],"validate":[267],"ability":[269],"efficiently":[275],"packets":[278],"97.9%":[280],"accuracy":[281,289,317],"using":[282,290],"compared":[286],"95.4%":[288],"base":[292],"pre-trained":[293],"Qwen3":[294],"0.6B":[295],"model.":[296],"When":[297],"performs":[301],"searches":[303],"enrich":[305],"adapters\u2019":[308],"context":[309],"during":[310],"generation,":[312],"our":[313],"maintains":[315],"96.0%":[319],"across":[320],"all":[321],"tested":[322]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-01-05T00:00:00"}
