VCSTC: Virtual Cyber Security Testing Capability - An Application Oriented Paradigm for Network Infrastructure Protection
نویسندگان
چکیده
Network security devices are becoming more sophisticated and so are the testing processes. Traditional network testbeds face challenges in terms of fidelity, scalability and complexity of security features. In this paper we propose a new methodology of testing security devices using network virtualization techniques, and present an integrated solution, including network emulation, test case specification and automated test execution. Our hybrid network emulation scheme provides high fidelity by host virtualization and scalability by lightweight protocol stack emulation. We also develop an intermediate level test case description language that is suitable for security tests at various network protocol layers and that can be executed automatically on the emulated network. The methodology presented in this paper has been implemented and integrated into a security infrastructure testing system for US Department of Defense and we report the experimental results.
منابع مشابه
Network Anomaly Detection in Critical Infrastructure Based on Mininet Network Simulator
In this paper, a highly-configurable network anomaly detection system for Critical Infrastructure scenarios is presented. The Mininet virtual machine environment has been used in this framework to simulate an Industrial Control System network and to replicate both physical and cyber components. Finally, a cyber-attack has been implemented for showing both the effectiveness and capability of the...
متن کاملMaturity and Process Capability Models and Their Use in Measuring Resilience in Critical Infrastructure Protection Sectors
This paper provides a literature review and survey of maturity and process capability models, Critical Infrastructure Protection (CIP) tools and frameworks to identify strategies for assessing and measuring resilience and risk management capabilities, with a specific focus on the electricity generating sector. The focus is on the use of models such as CERT-RMM, and others, as a means of address...
متن کاملSecond Annual Cyber Security and Information Infrastructure Research Workshop May 10 - 11 , 2006 BEYOND THE MAGINOT LINE
Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an inves...
متن کاملDesign and Implementation of a Critical Infrastructure Security and Assessment Laboratory
The globally-connected information superhighway, known as cyberspace, ushered our dependence on information technology to support our critical infrastructure. In a recent study [1] conducted by the United States Government Accountability Office (GAO) on critical infrastructure protection, the lessons learned from the first Cyber Storm exercise have yet to be fully addressed. In October, 1997, t...
متن کاملAuthorization models for secure information sharing: a survey and research agenda
This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008