Abstract
The paper aims to start a discussion about challenges and possible caveats of performing network security experiments with high traffic volumes in virtual environment. A new framework for rapid evolution of denial-of-service attacks by genetic algorithms is presented. Issues with virtual environment that were encountered during initial work with the framework are listed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chertov, R., Fahmy, S., Shroff, N.B.: Emulation versus simulation: a case study of TCP-targeted denial of service attacks. In: Testbeds and Research Infrastructures for the Development of Networks and Communities. TRIDENTCOM 2006, p. 10. IEEE (2006)
Mirkovic, J., Benzel, T., Faber, T., Braden, R., Wroclawski, J., Schwab, S.: The DETER project: advancing the science of cyber security experimentation and test. In: Proceedings of IEEE International Conference Technology HST, p. 17. IEEE, November 2010
Schmidt, D., Suriadi, S., Tickle, A., Clark, A., Mohay, G., Ahmed, E., Mackie, J.: A distributed denial of service testbed. In: Berleur, J., Hercheui, M.D., Hilty, L.M. (eds.) HCC9/CIP 2010. IFIP AICT, vol. 328, pp. 338–349. Springer, Heidelberg (2010)
Eddington, M.: Peach fuzzing platform (2011). 30/11/2014. http://peachfuzzer.com
Acknowledgment
Authors would like to express gratitude to the members of Centre for Research on Cryptography and Security of Masaryk University for their valuable ideas and feedback. Special thanks go to Andriy Stetsko, Zdenek Riha and Marek Sys. Petr Svenda and Vashek Matyas were supported by the Czech Science Foundation project GBP202/12/G061.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Bukac, V., Ostadal, R., Svenda, P., Baghdasaryan, T., Matyas, V. (2015). Challenges of Fiction in Network Security – Perspective of Virtualized Environments. In: Christianson, B., Švenda, P., Matyáš, V., Malcolm, J., Stajano, F., Anderson, J. (eds) Security Protocols XXIII. Security Protocols 2015. Lecture Notes in Computer Science(), vol 9379. Springer, Cham. https://doi.org/10.1007/978-3-319-26096-9_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-26096-9_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-26095-2
Online ISBN: 978-3-319-26096-9
eBook Packages: Computer ScienceComputer Science (R0)