2014 IEEE Network Operations and Management Symposium (NOMS) 2014
DOI: 10.1109/noms.2014.6838298
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based testbed for simulation of cyber attacks

Abstract: Abstract-Cyber attacks have become ubiquitous and in order to face current threats it is important to understand them. Studying attacks in a real environment however, is not viable and therefore it is necessary to find other methods how to examine the nature of attacks. Gaining detailed knowledge about them facilitates designing of new detection methods as well as understanding their impact. In this paper we present a testbed framework to simulate attacks that enables to study a wide range of security scenario… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…Further, we briefly introduce intended approach to the problem. So far, we have developed necessary tools for collecting data and flow information extension, e.g., HTTP monitoring [18], and we have implemented the testbed for the model evaluation [10].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Further, we briefly introduce intended approach to the problem. So far, we have developed necessary tools for collecting data and flow information extension, e.g., HTTP monitoring [18], and we have implemented the testbed for the model evaluation [10].…”
Section: Resultsmentioning
confidence: 99%
“…Many of them are rather old, though, and they do not represent real world traffic properly [2]. To find the ground truth, we are developing a cloudbased security research testbed [10] that is designed for controlled simulation of network attacks. Using this testbed, we intend to carry out controlled experiments that enable us to measure a very-close-to-real-world data.…”
Section: Research Questions and Proposed Approachmentioning
confidence: 99%
“…We are able to simulate given network, connected devices, and perform various types of attacks to examine vulnerabilities and discover potential pitfalls of a simulated system. Since the proposed testbed architecture has been described very briefly, we recommend reading the full paper [1] that provides details of the current testbed's implementation.…”
Section: Discussionmentioning
confidence: 99%
“…Cybernetic Proving Ground 1 (CPG) is a testbed designed especially for a network security management and simulation [1]. It is a scalable, universal solution which is designed for deployment in clouds managed by OpenNebula 2 .…”
Section: Introductionmentioning
confidence: 99%
“…To facilitate a cyber protection training and to evaluate benefits of visualization techniques for situation awareness, we attempt to use KYPO Cyber Range [9], where various attacks and threats can be easily simulated. KYPO enables us to focus on linking the knowledge base with suitable visualizations and to evaluate their benefits.…”
Section: How To Utilize Exploratory Visualizations For Efficient Protmentioning
confidence: 99%