Skip to main content

Challenges of Fiction in Network Security – Perspective of Virtualized Environments

  • Conference paper
  • First Online:
Security Protocols XXIII (Security Protocols 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9379))

Included in the following conference series:

  • 746 Accesses

Abstract

The paper aims to start a discussion about challenges and possible caveats of performing network security experiments with high traffic volumes in virtual environment. A new framework for rapid evolution of denial-of-service attacks by genetic algorithms is presented. Issues with virtual environment that were encountered during initial work with the framework are listed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chertov, R., Fahmy, S., Shroff, N.B.: Emulation versus simulation: a case study of TCP-targeted denial of service attacks. In: Testbeds and Research Infrastructures for the Development of Networks and Communities. TRIDENTCOM 2006, p. 10. IEEE (2006)

    Google Scholar 

  2. Mirkovic, J., Benzel, T., Faber, T., Braden, R., Wroclawski, J., Schwab, S.: The DETER project: advancing the science of cyber security experimentation and test. In: Proceedings of IEEE International Conference Technology HST, p. 17. IEEE, November 2010

    Google Scholar 

  3. Schmidt, D., Suriadi, S., Tickle, A., Clark, A., Mohay, G., Ahmed, E., Mackie, J.: A distributed denial of service testbed. In: Berleur, J., Hercheui, M.D., Hilty, L.M. (eds.) HCC9/CIP 2010. IFIP AICT, vol. 328, pp. 338–349. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  4. Eddington, M.: Peach fuzzing platform (2011). 30/11/2014. http://peachfuzzer.com

Download references

Acknowledgment

Authors would like to express gratitude to the members of Centre for Research on Cryptography and Security of Masaryk University for their valuable ideas and feedback. Special thanks go to Andriy Stetsko, Zdenek Riha and Marek Sys. Petr Svenda and Vashek Matyas were supported by the Czech Science Foundation project GBP202/12/G061.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vit Bukac .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Bukac, V., Ostadal, R., Svenda, P., Baghdasaryan, T., Matyas, V. (2015). Challenges of Fiction in Network Security – Perspective of Virtualized Environments. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-26096-9_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-26095-2

  • Online ISBN: 978-3-319-26096-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics