wiki:ExptsSecurityAnalysis

Version 33 (modified by hxy@cs.ua.edu, 13 years ago) (diff)

--

Project Number

1783

Project Title

GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis
a.k.a. ExptsSecurity

Technical Contacts

Principal Investigator Xiaoyan Hong hxy@cs.ua.edu
Co-PI: Fei Hu fei@eng.ua.edu
Co-PI: Yang Xiao yangxiao@ieee.org

Participating Organizations

Department of Computer Science
The University of Alabama, Box 870290
Tuscaloosa, AL 35487

Department of Electrical and Computer Engineering
The University of Alabama, Box 870286
Tuscaloosa, AL 35487

GPO Liaison System Engineer

Vic Thomas vthomas@geni.net

Scope

This effort will help define GENI security requirements based on investigations through ProtoGENI experiments using at least two aggregates, one of which will be a wireless aggregate. The investigations will use network traffic capture and analysis under both normal and misbehaving situations. The well-articulated experiments will analyze the security and privacy characteristics, test GENI traffic recording and capture tools (following the results from Spiral I and II), and make suggestions for improvements to the ProtoGENI control framework with special emphasis on security improvements.

Current Capabilities

BRIEF descriptions of resources/functions/tools that are available to anyone in the GENI community

Milestones

MilestoneDate(ExptsSec: S3.a Report on results of experiments designed in Yr. 1)? Report on activities and deliverables for this milestone.
MilestoneDate(ExptsSec: S3.b Report on experiments designed in Milestone a)? Report of recent results and suggestions.
MilestoneDate(ExptsSec: S3.c Report of the experiments designed in Milestone b)? Report of results and suggestions for S3.c.
MilestoneDate(ExptsSec: S3.d Experiment design document 3)?

Project Technical Documents

Description of planned security experiments
Revised description of planned security experiments
Presentation at GEC7
Report on initial experiments and findings
Report on experimentation exploiting vulnerabilities and validating vulnerability hypotheses
Presentation at GEC8
Spiral 2 Year-end Project Review
Report on experiment design to extend the scope to wireless nodes
Presentation at GEC9
Explore ProtoGENI Security Problems From Experimentation, Dawei Li, Xiaoyan Hong, a preparation for submission, Dec 2010.
Summary Findings and Suggestions
Presentation at GEC10
Report of recent results and suggestions.

Quarterly Status Reports

December 2009 report
March 2010 report
June 2010 report
GEC9 2010 report
GEC10 2011 report

Spiral 2 Connectivity

To be reviewed: Layer 3 connectivity to ProtoGENI clearinghouse. Layer 3 connectivity to provision resources used by experiments. Layer 2/3 connectivity between resources used in experiment.

Related Projects

Includes non-GENI projects.

Attachments (21)