SEER: A Security Experimentation EnviRonment for DETER

نویسندگان

  • Brett Wilson
  • Calvin Ko
  • Alefiya Hussain
چکیده

Configuring a security experiment can be tedious, involving many low level and repetitive configuration tasks. In order to make DETER’s capabilites accessible to users at all skill levels, we have designed and implemented a Security Experimentation EnviRonment (SEER) that provides security researchers the ability to create, plan, and iterate through a large range of experimental scenarios with relative ease. SEER integrates various tools for configuring and executing experiments and provides a user-friendly interface for experimenters to use the tools. SEER aims to support a wide range of experimentation requirements such that many researchers will prefer to interact with DETER through it, fostering collaboration within the security research community.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Plan for Malware Containment in the DETER Testbed

The DETER testbed provides a shared Internet-accessible environment where security researchers can safely run experiments and companies can test their security products. Experimentation with malware in DETER has so far been limited to simulated worms, which only simulate the spreading action without actually infecting any computer systems. This paper outlines a set of architectural and procedur...

متن کامل

Automating DDoS Experimentation

While the DETER testbed provides a safe environment and basic tools for security experimentation, researchers face a significant challenge in assembling the testbed pieces and tools into realistic and complete experimental scenarios. In this paper, we describe our work on automating experimentation for distributed denial-ofservice attacks. We developed the following automation tools: (1) the Ex...

متن کامل

The DETER Testbed: Overview

The DETER testbed is designed to provide an experimental environment in which government, academic, and industry cyber-security researchers can safely analyze and measure attacks and develop attack mitigation and confinement strategies. In addition, the DETER project will provide tools and resources to enable repeatable experiment methodologies, allowing different researchers to duplicate and a...

متن کامل

Emulation of Abilene Network using DETER

Security of networked computing systems has become increasingly paramount. The daily function of society hinges on the safe and reliable operation of these infrastructures. The detection of attack traffic on network infrastructures necessitates experimentation on accurately modeled emulations. In this research, a model of the Abilene topology was created using the DETERlab testbed. Network traf...

متن کامل

Design, Deployment, and Use of the DETER Testbed

The DETER testbed provides infrastructure for conducting medium-scale repeatable experiments in computer security, especially experiments that involve malicious code. Built using Utah’s EMULAB, the DETER testbed has been configured and extended to provide stronger assurances for isolation and containment. This paper provides information on the capabilities of the DETER testbed and discusses the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007