Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2459976.2460038acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Operational system testing for designed in security

Published: 08 January 2013 Publication History

Abstract

To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance.
In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.

Supplementary Material

a55-ozcelik.pdf (a55-ozcelik_supp.pdf)
Supplemental file.

References

[1]
High throughput computing. This is an electronic document. Available: "http://citi.clemson.edu/htc". Date retrieved: February 1, 2012.
[2]
Global enviroment for network innovations (geni), "http://www.geni.net/", 2011.
[3]
J. Altmann. Surfing the wavelets. This is an electronic document. Available: "http://www.wavelet.org/tutorial/". Date of publication: {1996}. Date retrieved: July 28, 2012.
[4]
R. B. Blazek, H. Kim, B. Rozovskii, and A. Tartakovsky. A novel approach to detection of "denial-of-service" attacks via adaptive sequential and batch-sequential change-point detection methods. In IEEE Systems, MAN, and Cybernetics Information Assurance and Security Workshop, pages 220--226, June 2001.
[5]
R. Brooks. Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks. CRC Press, Boca Raton, FL, first crc printing edition, 2005.
[6]
C. Callegari, S. Giordano, M. Pagano, and T. Pepe. Wave-cusum Improving cusum performance in network anomaly detection by means of wavelet analysis. Computers and Security, 31(5):727--735, 2012.
[7]
G. Carl, R. R. Brooks, and S. Rai. Wavelet based denial-of-service detection. Computers and Security, 25(8):600--615, 2006.
[8]
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38:69--74, March 2008.

Cited By

View all
  • (2014)GENI: Large-scale distributed infrastructure for networking and distributed systems research2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)10.1109/CCE.2014.6916696(156-161)Online publication date: Jul-2014

Index Terms

  1. Operational system testing for designed in security

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
    January 2013
    282 pages
    ISBN:9781450316873
    DOI:10.1145/2459976

    Sponsors

    • Los Alamos National Labs: Los Alamos National Labs
    • Sandia National Labs: Sandia National Laboratories
    • DOE: Department of Energy
    • Oak Ridge National Laboratory
    • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
    • BERKELEYLAB: Lawrence National Berkeley Laboratory
    • Argonne Natl Lab: Argonne National Lab
    • Idaho National Lab.: Idaho National Laboratory
    • Pacific Northwest National Laboratory
    • Nevada National Security Site: Nevada National Security Site

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 08 January 2013

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Condor
    2. DoS/DDoS
    3. GENI
    4. design
    5. openflow
    6. security experimentation

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSIIRW '13
    Sponsor:
    • Los Alamos National Labs
    • Sandia National Labs
    • DOE
    • Lawrence Livermore National Lab.
    • BERKELEYLAB
    • Argonne Natl Lab
    • Idaho National Lab.
    • Nevada National Security Site
    CSIIRW '13: Cyber Security and Information Intelligence
    January 8 - 10, 2013
    Tennessee, Oak Ridge, USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 01 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)GENI: Large-scale distributed infrastructure for networking and distributed systems research2014 IEEE Fifth International Conference on Communications and Electronics (ICCE)10.1109/CCE.2014.6916696(156-161)Online publication date: Jul-2014

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media