Creation of realistic benign behavior for cyber range VM clients with ML methods