| 1 | [[PageOutline]] |
| 2 | |
| 3 | == Project Number == |
| 4 | |
| 5 | 1783 |
| 6 | |
| 7 | == Project Title == |
| 8 | |
| 9 | GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis [[BR]] |
| 10 | a.k.a. !ExptsSecurity |
| 11 | |
| 12 | === Technical Contacts === |
| 13 | |
| 14 | Principal Investigator Xiaoyan Hong hxy@cs.ua.edu [[BR]] |
| 15 | Co-PI: Fei Hu fei@eng.ua.edu [[BR]] |
| 16 | Co-PI: Yang Xiao yangxiao@ieee.org |
| 17 | |
| 18 | === Participating Organizations === |
| 19 | |
| 20 | Department of Computer Science [[BR]] |
| 21 | The University of Alabama, Box 870290 [[BR]] |
| 22 | Tuscaloosa, AL 35487[[BR]] |
| 23 | [[BR]] |
| 24 | |
| 25 | Department of Electrical and Computer Engineering [[BR]] |
| 26 | The University of Alabama, Box 870286 [[BR]] |
| 27 | Tuscaloosa, AL 35487 |
| 28 | |
| 29 | |
| 30 | === GPO Liason System Engineer === |
| 31 | |
| 32 | Vic Thomas vthomas@geni.net |
| 33 | |
| 34 | == Scope == |
| 35 | |
| 36 | This effort will help define GENI security requirements based on investigations through ProtoGENI experiments using at least two aggregates, one of which will be a wireless aggregate. The investigations will use network traffic capture and analysis under both normal and misbehaving situations. The well-articulated experiments will analyze the security and privacy characteristics, test GENI traffic recording and capture tools (following the results from Spiral I and II), and make suggestions for improvements to the ProtoGENI control framework with special emphasis on security improvements. |
| 37 | |
| 38 | === Current Capabilities === |
| 39 | |
| 40 | BRIEF descriptions of resources/functions/tools that are available to anyone in the GENI community |
| 41 | |
| 42 | === Milestones === |
| 43 | |
| 44 | [[MilestoneDate(ExptsSec: S2.a)]] Experiment design document [[BR]] |
| 45 | [[MilestoneDate(ExptsSec: S2.b)]] Report on initial experimentation on ProtoGENI and revised experiment design. [[BR]] |
| 46 | [[MilestoneDate(ExptsSec: S2.c)]] Report on experiments that validate vulnerability hypotheses/exploit vulnerabilities. [[BR]] |
| 47 | [[MilestoneDate(ExptsSec: S2.d)]] Experiment design document 2. [[BR]] |
| 48 | |
| 49 | |
| 50 | == Project Technical Documents == |
| 51 | |
| 52 | Links to wiki pages for the project's technical documents go here. List should include any document in the working groups, as well as other useful documents. Projects may have a full tree of wiki pages here. |
| 53 | |
| 54 | === Quarterly Status Reports === |
| 55 | |
| 56 | QuarterlyStatusReportTemplate |
| 57 | |
| 58 | |
| 59 | === Spiral 2 Connectivity === |
| 60 | |
| 61 | To be reviewed: Layer 3 connectivity to ProtoGENI clearinghouse. Layer 3 connectivity to provision resources used by experiments. Layer 2/3 connectivity between resources used in experiment. |
| 62 | |
| 63 | === Related Projects === |
| 64 | |
| 65 | Includes non-GENI projects. |