Abstract
The construction of virtual environments for emulation and detection of DDoS attacks enables controlled analysis of the impacts of this malicious activity, avoiding damage to people and services offered in network environments. Through tools such as docker and kubernetes, it is possible to emulate networks in virtual environments segregated from the network environments used by people and…