Abstract
Creating an experimental infrastructure for developing next-generation information security technologies.
- Floyd, S. and Kohler, E. Internet research needs better models. Hotnets-I (Oct. 2002).Google Scholar
- Floyd, S. and Paxson, V. Difficulties in simulating the Internet. IEEE/ACM Transactions on Networking 9, 4 (Aug. 2001), 392--403. Google ScholarDigital Library
- Hardaker, W. et al. Justification and Requirements for a National DDoS Defense Technology Evaluation Facility. Network Associates Laboratories Report 02-052, July 26, 2002.Google Scholar
- Kurose, J., Ed. Report of NSF Workshop on Network Research Testbeds (Nov. 2002); gaia.cs.umass.edu/testbed_workshop.Google Scholar
- McHugh, J. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system valuations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4 (Nov. 2000), 262--294. Google ScholarDigital Library
- Pawlikowski, K., Jeong, H., and Lee, J. On credibility of simulation studies of telecommunication networks. IEEE Communications Magazine (Jan. 2001). Google ScholarDigital Library
- Peterson, L., Anderson, T., Culler, D., and Roscoe, T. A blueprint for introducing disruptive technology into the Internet. In Proceedings of the 1st ACM Workshop on Hot Topics in Networks (HotNets-I) (Oct. 2002), 4--140.Google Scholar
- White, B. et al. An integrated experimental environment for distributed systems and networks. In Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI02), (Dec. 2002). Google ScholarDigital Library
Index Terms
- Cyber defense technology networking and evaluation
Recommendations
Optimizing Active Cyber Defense
GameSec 2013: 4th International Conference on Decision and Game Theory for Security - Volume 8252Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to ...
Hybrid cyber defense strategies using Honey-X: A survey
AbstractThe development and adoption of network technologies reshape our daily life; however, network-connected devices have become popular targets of cybercrimes. Honey-X-based cyber defense technologies, like honeypots, honeynets, and honeytokens, can ...
Active cyber defense dynamics exhibiting rich phenomena
HotSoS '15: Proceedings of the 2015 Symposium and Bootcamp on the Science of SecurityThe Internet is a man-made complex system under constant attacks (e.g., Advanced Persistent Threats and malwares). It is therefore important to understand the phenomena that can be induced by the interaction between cyber attacks and cyber defenses. In ...
Comments