Emulation of Abilene Network using DETER

نویسندگان

  • John Mela
  • Blaine Nelson
  • Saurabh Amin
  • Suzanna Schmeelk
  • Shankar Sastry
چکیده

Security of networked computing systems has become increasingly paramount. The daily function of society hinges on the safe and reliable operation of these infrastructures. The detection of attack traffic on network infrastructures necessitates experimentation on accurately modeled emulations. In this research, a model of the Abilene topology was created using the DETERlab testbed. Network traffic flows were emulated on top of this model. The specification of Abilene’s traffic flows could be used to represent the network’s background traffic in scale. As this model more closely imitates Abilene both in structure and behavior, a door to extensive experimentation is opened.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Emulating an Embedded Firewall

The Adventium Labs Embedded Distributed Firewall provides a simple interface for securely managing approved network flows between computers on a network. A “conversation” manager provides a simple interface for managing flows, defining the connections authorized between nodes on a network. These policies are enforced in hardware embedded in the network interface card of each computer. The polic...

متن کامل

Evaluation of collaborative worm containment on the DETER testbed

The advantage of collaborative containment over independent block or address blacklisting on worm defense has been advocated in previous worm studies. In this work, we will evaluate two collaborative worm containment proposals and present some of the results of our DETER emulation experiments. In the first one, proactive worm containment (PWC), security agents block all suspicious hosts on the ...

متن کامل

Emulating sequential scanning worms on the DETER testbed

Internet worm security threats have increased with their more advanced scanning strategies and malicious payloads. In this article, we extend our existing KMSim worm model to account for the self-destructive or removal/death behavior of worms. The modified model is then used to simulate the Witty and Blaster worms. Also in this paper we describe our experience of running worm emulation experime...

متن کامل

Load Balancing and Congestion Control in Software Defined Networking using the Extended Johnson Algorithm for Data Centre

Software-Defined Networking (SDN), showcases a paradigm shift from traditional network towards a new era of Internet. Distributed controllers addresses hindrances like availability and scalability which fails to provide a dynamic mechanism for load balancing. Implementation of Dynamic load balancing safe guard the network from sudden traffic congestion which could be created by data spikes or l...

متن کامل

Proposed Approach of Extended Johnson Algorithm Analysis for Load Balancing and Congestion Control in Software Defined Networking

Software-Defined Networking (SDN), display cases of a paradigm shift from traditional network towards a new era of Internet. This paper offers different attempts to integrate congestion control (cc) and load balancing by combining SDN approach in conjunction with Extended Johnson Algorithm applied for sparse graphs. This proposed algorithm takes into consideration not only edge weights but also...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010