2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2006. TR 2006
DOI: 10.1109/tridnt.2006.1649172
|View full text |Cite
|
Sign up to set email alerts
|

Experience with DETER: a testbed for security research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
72
0
1

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 104 publications
(74 citation statements)
references
References 13 publications
0
72
0
1
Order By: Relevance
“…Other testbeds built using the Emulab software [14], including DETER [2], use a similar physical topology. Unrelated testbeds, such as StarBed [11] and Grid'500 [3], also use fundamentally similar physical topologies.…”
Section: The Emulab Testbedmentioning
confidence: 99%
See 2 more Smart Citations
“…Other testbeds built using the Emulab software [14], including DETER [2], use a similar physical topology. Unrelated testbeds, such as StarBed [11] and Grid'500 [3], also use fundamentally similar physical topologies.…”
Section: The Emulab Testbedmentioning
confidence: 99%
“…Network emulation testbeds [2,3,11,15,14] have become environments of choice for evaluating network research. Their ability to provide highly customizable network topologies make them suitable for hosting a wide variety of experiments, including security, networking, and distributed systems research.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Instead, target system and configuration are tested using special testbed before deployment. The last several decades have witnessed a great number of mature IP network testbed solutions [2,10], with the focus of integration testing and performance testing. In this work we study several key challenges and solutions particularly in testing network security devices.…”
Section: Introductionmentioning
confidence: 99%
“…VCSTC methodology spans over all four steps, although model construction step is not related to testing and therefore is not the focus on this paper. To the best of our knowledge our approach is the first to integrate network emulation and automated testing, and it is distinguished from the existing security testbed solutions (such as DETER [2]) by the following two key aspects.…”
Section: Introductionmentioning
confidence: 99%