| 354 | <a class="EntryGoto" id="Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge"></a> |
| 355 | <b class="myheading" style="position: relative; left: 5%;">Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</b> |
| 356 | |
| 357 | <div class="BibEntry"> |
| 358 | |
| 359 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 360 | |
| 361 | <li> |
| 362 | |
| 363 | |
| 364 | <tr> |
| 365 | <td valign="top">Author</td> |
| 366 | <td valign="top">Augé, Jordan and Parmentelat, Thierry and Turro, Nicolas and Avakian, Sandrine and Baron, Lo\\ic and Larabi, Mohamed A. and Rahman, Mohammed Y. and Friedman, Timur and Fdida, Serge</td> |
| 367 | </tr> |
| 368 | |
| 369 | <tr> |
| 370 | <td valign="top">Title</td> |
| 371 | <td valign="top">Tools to foster a global federation of testbeds</td> |
| 372 | </tr> |
| 373 | |
| 374 | <tr> |
| 375 | <td valign="top">Journal</td> |
| 376 | <td valign="top">Computer Networks</td> |
| 377 | </tr> |
| 378 | |
| 379 | <tr> |
| 380 | <td valign="top">Year</td> |
| 381 | <td valign="top">2014</td> |
| 382 | </tr> |
| 383 | |
| 384 | <tr> |
| 385 | <td valign="top">Abstract</td> |
| 386 | <td valign="top">A global federation of experimental facilities in computer networking is being built on the basis of a thin waist, the Slice-based Federation Architecture (SFA), for managing testbed resources in a secure and efficient way. Its success will depend on the existence of tools that allow testbeds to expose their local resources and users to browse and select the resources most appropriate for their experiments. This paper presents two such tools. First, SFAWrap, which makes it relatively easy for a testbed owner to provide an SFA interface for their testbed. Second, MySlice, a tool that allows experimenters to browse and reserve testbed resources via SFA, and that is extensible through a system of plug-ins. Together, these tools should lower the barriers to entry for testbed owners who wish to join the global federation.</td> |
| 387 | </tr> |
| 388 | |
| 389 | |
| 390 | |
| 391 | <tr> |
| 392 | <td valign="top">DOI</td> |
| 393 | <td valign="top">10.1016/j.bjp.2013.12.038</td> |
| 394 | </tr> |
| 395 | |
| 396 | |
| 397 | |
| 398 | <tr> |
| 399 | <td valign="top">URL</td> |
| 400 | <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.12.038">http://dx.doi.org/10.1016/j.bjp.2013.12.038</a></td> |
| 401 | </tr> |
| 402 | |
| 403 | |
| 404 | </li> |
| 405 | |
| 406 | </table></div><br><br> |
| 407 | |
| 408 | |
| 409 | |
| 410 | |
354 | 411 | <a class="EntryGoto" id="Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David"></a> |
355 | 412 | <b class="myheading" style="position: relative; left: 5%;">Baldine, Ilia and Xin, Yufeng and Mandal, Anirban and Renci, Chris H. and Chase, Unc-Ch J. and Marupadi, Varun and Yumerefendi, Aydan and Irwin, David</b> |
| 2684 | <td valign="top">Measuring experiments in GENI</td> |
| 2685 | </tr> |
| 2686 | |
| 2687 | <tr> |
| 2688 | <td valign="top">Journal</td> |
| 2689 | <td valign="top">Computer Networks</td> |
| 2690 | </tr> |
| 2691 | |
| 2692 | <tr> |
| 2693 | <td valign="top">Year</td> |
| 2694 | <td valign="top">2014</td> |
| 2695 | </tr> |
| 2696 | |
| 2697 | <tr> |
| 2698 | <td valign="top">Abstract</td> |
| 2699 | <td valign="top">Experimentation with new network architectures and protocols is one of the primary motivations for building future Internet testbeds such as the Global Environment for Network Innovations (GENI) testbed. A key part of experimentation is the ability to observe, measure, evaluate, and compare these new architectures and protocols. Observing an experiment's network performance requires setting up the measurement infrastructure needed to monitor and record the behavior of the network. It also requires a full set of tools and user interfaces that enable access to the measurement data both while the experiment is running and later during post-analysis. To simplify the task of measuring experiments in future Internet testbeds like GENI, we developed an instrumentation and measurement system called INSTOOLS. It automates the process of setting up the measurement infrastructure, tailoring the measurement infrastructure and the data capture to the experimental network's topology and configuration. In addition, INSTOOLS provides a suite of tools via its ” portal” service that make it easy for users to observe, measure, format, and archive data from their experiments. This paper describes the INSTOOLS system and the set of interfaces/tools it offers to users. INSTOOLS has been in use for several years, and we provide performance results that illustrate its scalability. We also present our second-generation portal, the GENI One Stop Portal, that offers a comprehensive interface to a wide range of tools.</td> |
| 2700 | </tr> |
| 2701 | |
| 2702 | |
| 2703 | |
| 2704 | <tr> |
| 2705 | <td valign="top">DOI</td> |
| 2706 | <td valign="top">10.1016/j.bjp.2013.10.016</td> |
| 2707 | </tr> |
| 2708 | |
| 2709 | |
| 2710 | |
| 2711 | <tr> |
| 2712 | <td valign="top">URL</td> |
| 2713 | <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.10.016">http://dx.doi.org/10.1016/j.bjp.2013.10.016</a></td> |
| 2714 | </tr> |
| 2715 | |
| 2716 | |
| 2717 | </li> |
| 2718 | |
| 2719 | </table></div><br><br> |
| 2720 | |
| 2721 | |
| 2722 | <div class="BibEntry"> |
| 2723 | |
| 2724 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 2725 | |
| 2726 | <li> |
| 2727 | |
| 2728 | |
| 2729 | <tr> |
| 2730 | <td valign="top">Author</td> |
| 2731 | <td valign="top">Griffioen, James and Fei, Zongming and Nasir, Hussamuddin and Wu, Xiongqi and Reed, Jeremy and Carpenter, Charles</td> |
| 2732 | </tr> |
| 2733 | |
| 2734 | <tr> |
| 2735 | <td valign="top">Title</td> |
| 4199 | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
| 4200 | </tr> |
| 4201 | |
| 4202 | <tr> |
| 4203 | <td valign="top">Year</td> |
| 4204 | <td valign="top">2012</td> |
| 4205 | </tr> |
| 4206 | |
| 4207 | |
| 4208 | |
| 4209 | <tr> |
| 4210 | <td valign="top">DOI</td> |
| 4211 | <td valign="top">10.1109/NOMS.2012.6211961</td> |
| 4212 | </tr> |
| 4213 | |
| 4214 | |
| 4215 | |
| 4216 | <tr> |
| 4217 | <td valign="top">URL</td> |
| 4218 | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
| 4219 | </tr> |
| 4220 | |
| 4221 | |
| 4222 | </li> |
| 4223 | |
| 4224 | </table></div><br><br> |
| 4225 | |
| 4226 | |
| 4227 | <div class="BibEntry"> |
| 4228 | |
| 4229 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4230 | |
| 4231 | <li> |
| 4232 | |
| 4233 | |
| 4234 | <tr> |
| 4235 | <td valign="top">Author</td> |
| 4236 | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
| 4237 | </tr> |
| 4238 | |
| 4239 | <tr> |
| 4240 | <td valign="top">Title</td> |
| 4241 | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
| 4242 | </tr> |
| 4243 | |
| 4244 | <tr> |
| 4245 | <td valign="top">Booktitle</td> |
4133 | | <div class="BibEntry"> |
4134 | | |
4135 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
4136 | | |
4137 | | <li> |
4138 | | |
4139 | | |
4140 | | <tr> |
4141 | | <td valign="top">Author</td> |
4142 | | <td valign="top">Maccherani, E. and Femminella, M. and Lee, J. W. and Francescangeli, R. and Janak, J. and Reali, G. and Schulzrinne, H.</td> |
4143 | | </tr> |
4144 | | |
4145 | | <tr> |
4146 | | <td valign="top">Title</td> |
4147 | | <td valign="top">Extending the NetServ autonomic management capabilities using OpenFlow</td> |
4148 | | </tr> |
4149 | | |
4150 | | <tr> |
4151 | | <td valign="top">Booktitle</td> |
4152 | | <td valign="top">Network Operations and Management Symposium (NOMS), 2012 IEEE</td> |
4153 | | </tr> |
4154 | | |
4155 | | <tr> |
4156 | | <td valign="top">Year</td> |
4157 | | <td valign="top">2012</td> |
4158 | | </tr> |
4159 | | |
4160 | | |
4161 | | |
4162 | | <tr> |
4163 | | <td valign="top">DOI</td> |
4164 | | <td valign="top">10.1109/NOMS.2012.6211961</td> |
4165 | | </tr> |
4166 | | |
4167 | | |
4168 | | |
4169 | | <tr> |
4170 | | <td valign="top">URL</td> |
4171 | | <td valign="top"><a href="http://dx.doi.org/10.1109/NOMS.2012.6211961">http://dx.doi.org/10.1109/NOMS.2012.6211961</a></td> |
4172 | | </tr> |
4173 | | |
4174 | | |
4175 | | </li> |
4176 | | |
4177 | | </table></div><br><br> |
4178 | | |
4179 | | |
| 4980 | <a class="EntryGoto" id="Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala"></a> |
| 4981 | <b class="myheading" style="position: relative; left: 5%;">Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</b> |
| 4982 | |
| 4983 | <div class="BibEntry"> |
| 4984 | |
| 4985 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 4986 | |
| 4987 | <li> |
| 4988 | |
| 4989 | |
| 4990 | <tr> |
| 4991 | <td valign="top">Author</td> |
| 4992 | <td valign="top">Nozaki, Yoshihiro and Bakshi, Parth and Tuncer, Hasan and Shenoy, Nirmala</td> |
| 4993 | </tr> |
| 4994 | |
| 4995 | <tr> |
| 4996 | <td valign="top">Title</td> |
| 4997 | <td valign="top">Evaluation of tiered routing protocol in floating cloud tiered internet architecture</td> |
| 4998 | </tr> |
| 4999 | |
| 5000 | <tr> |
| 5001 | <td valign="top">Journal</td> |
| 5002 | <td valign="top">Computer Networks</td> |
| 5003 | </tr> |
| 5004 | |
| 5005 | <tr> |
| 5006 | <td valign="top">Year</td> |
| 5007 | <td valign="top">2014</td> |
| 5008 | </tr> |
| 5009 | |
| 5010 | <tr> |
| 5011 | <td valign="top">Abstract</td> |
| 5012 | <td valign="top">Clean slate future Internet initiatives have been ongoing for a few years. An important consideration in the eventual deployment of solutions for such Internet architectures is the testing and validation of the design and its scalability in realistic network environments. Large scale emulation and experimentation testbeds sponsored and funded by major research organizations worldwide provide a suitable platform for the purpose. In this article, we present the implementation details of a new network and routing protocol that entirely replaces IP and its routing protocols from the protocol stack to provide efficient routing and forwarding of packets in a clean slate Floating Cloud Tiered (FCT) Internet architecture. The FCT architecture leverages the tier structure existing among ISPs, and has a new addressing and routing schema based on tiers. In this article, the implementation and evaluation details of the network protocol with these two features, namely the tiered addressing and tier-based routing using the Global Environmental for Network Innovations (GENI) testbed are presented. The performance of the protocol is also compared with Open Shortest Path First (OSPF) implemented over the GENI testbed for identical network topologies.</td> |
| 5013 | </tr> |
| 5014 | |
| 5015 | |
| 5016 | |
| 5017 | <tr> |
| 5018 | <td valign="top">DOI</td> |
| 5019 | <td valign="top">10.1016/j.bjp.2013.11.010</td> |
| 5020 | </tr> |
| 5021 | |
| 5022 | |
| 5023 | |
| 5024 | <tr> |
| 5025 | <td valign="top">URL</td> |
| 5026 | <td valign="top"><a href="http://dx.doi.org/10.1016/j.bjp.2013.11.010">http://dx.doi.org/10.1016/j.bjp.2013.11.010</a></td> |
| 5027 | </tr> |
| 5028 | |
| 5029 | |
| 5030 | </li> |
| 5031 | |
| 5032 | </table></div><br><br> |
| 5033 | |
| 5034 | |
| 5035 | |
| 5036 | |
| 5216 | <div class="BibEntry"> |
| 5217 | |
| 5218 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 5219 | |
| 5220 | <li> |
| 5221 | |
| 5222 | |
| 5223 | <tr> |
| 5224 | <td valign="top">Author</td> |
| 5225 | <td valign="top">Ozcelik, Ilker and Brooks, Richard R.</td> |
| 5226 | </tr> |
| 5227 | |
| 5228 | <tr> |
| 5229 | <td valign="top">Title</td> |
| 5230 | <td valign="top">Operational System Testing for Designed in Security</td> |
| 5231 | </tr> |
| 5232 | |
| 5233 | <tr> |
| 5234 | <td valign="top">Booktitle</td> |
| 5235 | <td valign="top">Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop</td> |
| 5236 | </tr> |
| 5237 | |
| 5238 | <tr> |
| 5239 | <td valign="top">Location</td> |
| 5240 | <td valign="top">Oak Ridge, Tennessee</td> |
| 5241 | </tr> |
| 5242 | |
| 5243 | <tr> |
| 5244 | <td valign="top">Publisher</td> |
| 5245 | <td valign="top">ACM</td> |
| 5246 | </tr> |
| 5247 | |
| 5248 | <tr> |
| 5249 | <td valign="top">Address</td> |
| 5250 | <td valign="top">New York, NY, USA</td> |
| 5251 | </tr> |
| 5252 | |
| 5253 | <tr> |
| 5254 | <td valign="top">Year</td> |
| 5255 | <td valign="top">2013</td> |
| 5256 | </tr> |
| 5257 | |
| 5258 | <tr> |
| 5259 | <td valign="top">Abstract</td> |
| 5260 | <td valign="top">To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.</td> |
| 5261 | </tr> |
| 5262 | |
| 5263 | |
| 5264 | |
| 5265 | <tr> |
| 5266 | <td valign="top">DOI</td> |
| 5267 | <td valign="top">10.1145/2459976.2460038</td> |
| 5268 | </tr> |
| 5269 | |
| 5270 | |
| 5271 | |
| 5272 | <tr> |
| 5273 | <td valign="top">URL</td> |
| 5274 | <td valign="top"><a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a></td> |
| 5275 | </tr> |
| 5276 | |
| 5277 | |
| 5278 | </li> |
| 5279 | |
| 5280 | </table></div><br><br> |
| 5281 | |
| 5282 | |
| 7474 | <td valign="top">PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI</td> |
| 7475 | </tr> |
| 7476 | |
| 7477 | <tr> |
| 7478 | <td valign="top">Booktitle</td> |
| 7479 | <td valign="top">Principles of Advanced and Distributed Simulation (PADS), 2011 IEEE Workshop on</td> |
| 7480 | </tr> |
| 7481 | |
| 7482 | <tr> |
| 7483 | <td valign="top">Location</td> |
| 7484 | <td valign="top">Nice, France</td> |
| 7485 | </tr> |
| 7486 | |
| 7487 | <tr> |
| 7488 | <td valign="top">Publisher</td> |
| 7489 | <td valign="top">IEEE</td> |
| 7490 | </tr> |
| 7491 | |
| 7492 | <tr> |
| 7493 | <td valign="top">Year</td> |
| 7494 | <td valign="top">2011</td> |
| 7495 | </tr> |
| 7496 | |
| 7497 | <tr> |
| 7498 | <td valign="top">Abstract</td> |
| 7499 | <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform -- a v̈irtual laboratory'' for the design, implementation and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines and local cluster nodes running virtual machines to seamlessly interoperate with the simulated network running within a designated s̈lice'' of resources. We show the results of our preliminary validation and performance studies to demonstrate the capabilities and limitations of our approach.</td> |
| 7500 | </tr> |
| 7501 | |
| 7502 | |
| 7503 | |
| 7504 | <tr> |
| 7505 | <td valign="top">DOI</td> |
| 7506 | <td valign="top">10.1109/pads.2011.5936747</td> |
| 7507 | </tr> |
| 7508 | |
| 7509 | |
| 7510 | |
| 7511 | <tr> |
| 7512 | <td valign="top">URL</td> |
| 7513 | <td valign="top"><a href="http://dx.doi.org/10.1109/pads.2011.5936747">http://dx.doi.org/10.1109/pads.2011.5936747</a></td> |
| 7514 | </tr> |
| 7515 | |
| 7516 | |
| 7517 | </li> |
| 7518 | |
| 7519 | </table></div><br><br> |
| 7520 | |
| 7521 | |
| 7522 | <div class="BibEntry"> |
| 7523 | |
| 7524 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 7525 | |
| 7526 | <li> |
| 7527 | |
| 7528 | |
| 7529 | <tr> |
| 7530 | <td valign="top">Author</td> |
| 7531 | <td valign="top">Van Vorst, N. and Erazo, M. and Liu, J.</td> |
| 7532 | </tr> |
| 7533 | |
| 7534 | <tr> |
| 7535 | <td valign="top">Title</td> |
7343 | | <a class="EntryGoto" id="Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason"></a> |
7344 | | <b class="myheading" style="position: relative; left: 5%;">Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason</b> |
7345 | | |
7346 | | <div class="BibEntry"> |
7347 | | |
7348 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7349 | | |
7350 | | <li> |
7351 | | |
7352 | | |
7353 | | <tr> |
7354 | | <td valign="top">Author</td> |
7355 | | <td valign="top">Van Vorst, Nathanael and Erazo, Miguel and Liu, Jason</td> |
7356 | | </tr> |
7357 | | |
7358 | | <tr> |
7359 | | <td valign="top">Title</td> |
7360 | | <td valign="top">PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI</td> |
7361 | | </tr> |
7362 | | |
7363 | | <tr> |
7364 | | <td valign="top">Booktitle</td> |
7365 | | <td valign="top">2011 IEEE Workshop on Principles of Advanced and Distributed Simulation</td> |
7366 | | </tr> |
7367 | | |
7368 | | <tr> |
7369 | | <td valign="top">Location</td> |
7370 | | <td valign="top">Nice, France</td> |
| 7638 | <a class="EntryGoto" id="Van Vorst, N. and Liu, J."></a> |
| 7639 | <b class="myheading" style="position: relative; left: 5%;">Van Vorst, N. and Liu, J.</b> |
| 7640 | |
| 7641 | <div class="BibEntry"> |
| 7642 | |
| 7643 | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
| 7644 | |
| 7645 | <li> |
| 7646 | |
| 7647 | |
| 7648 | <tr> |
| 7649 | <td valign="top">Author</td> |
| 7650 | <td valign="top">Van Vorst, N. and Liu, J.</td> |
| 7651 | </tr> |
| 7652 | |
| 7653 | <tr> |
| 7654 | <td valign="top">Title</td> |
| 7655 | <td valign="top">Realizing Large-Scale Interactive Network Simulation via Model Splitting</td> |
| 7656 | </tr> |
| 7657 | |
| 7658 | <tr> |
| 7659 | <td valign="top">Booktitle</td> |
| 7660 | <td valign="top">Principles of Advanced and Distributed Simulation (PADS), 2012 ACM/IEEE/SCS 26th Workshop on</td> |
7380 | | <td valign="top">2011</td> |
7381 | | </tr> |
7382 | | |
7383 | | <tr> |
7384 | | <td valign="top">Abstract</td> |
7385 | | <td valign="top">The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform -- a v̈irtual laboratory'' for the design, implementation and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines and local cluster nodes running virtual machines to seamlessly interoperate with the simulated network running within a designated s̈lice'' of resources. We show the results of our preliminary validation and performance studies to demonstrate the capabilities and limitations of our approach.</td> |
7386 | | </tr> |
7387 | | |
7388 | | |
7389 | | |
7390 | | <tr> |
7391 | | <td valign="top">DOI</td> |
7392 | | <td valign="top">10.1109/PADS.2011.5936747</td> |
7393 | | </tr> |
7394 | | |
7395 | | |
7396 | | |
7397 | | <tr> |
7398 | | <td valign="top">URL</td> |
7399 | | <td valign="top"><a href="http://dx.doi.org/10.1109/PADS.2011.5936747">http://dx.doi.org/10.1109/PADS.2011.5936747</a></td> |
7400 | | </tr> |
7401 | | |
7402 | | |
7403 | | </li> |
7404 | | |
7405 | | </table></div><br><br> |
7406 | | |
7407 | | |
7408 | | |
7409 | | |
7410 | | <a class="EntryGoto" id="Van Vorst, Nathanael and Liu, Jason"></a> |
7411 | | <b class="myheading" style="position: relative; left: 5%;">Van Vorst, Nathanael and Liu, Jason</b> |
7412 | | |
7413 | | <div class="BibEntry"> |
7414 | | |
7415 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
7416 | | |
7417 | | <li> |
7418 | | |
7419 | | |
7420 | | <tr> |
7421 | | <td valign="top">Author</td> |
7422 | | <td valign="top">Van Vorst, Nathanael and Liu, Jason</td> |
7423 | | </tr> |
7424 | | |
7425 | | <tr> |
7426 | | <td valign="top">Title</td> |
7427 | | <td valign="top">Realizing Large-Scale Interactive Network Simulation via Model Splitting</td> |
7428 | | </tr> |
7429 | | |
7430 | | <tr> |
7431 | | <td valign="top">Booktitle</td> |
7432 | | <td valign="top">Proceedings of the 26th Workshop on Principles of Advanced and Distributed Simulation (PADS'12)</td> |
7433 | | </tr> |
7434 | | |
7435 | | <tr> |
7436 | | <td valign="top">Year</td> |
7440 | | |
7441 | | |
7442 | | |
7443 | | |
7444 | | <tr> |
7445 | | <td valign="top">URL</td> |
7446 | | <td valign="top"><a href="http://www.researchgate.net/publication/229476062_Realizing_Large-Scale_Interactive_Network_Simulation_via_Model_Splitting/file/d912f500eb6b911215.pdf">http://www.researchgate.net/publication/229476062_Realizing_Large-Scale_Interactive_Network_Simulation_via_Model_Splitting/file/d912f500eb6b911215.pdf</a></td> |
| 7673 | <tr> |
| 7674 | <td valign="top">Abstract</td> |
| 7675 | <td valign="top">This paper presents the model splitting method for large-scale interactive network simulation, which addresses the separation of concerns between network researchers, who focus on developing complex network models and conducting large-scale network experiments, and simulator developers, who are concerned with developing efficient simulation engines to achieve the best performance on parallel platforms. Modeling splitting divides the system into an interactive model to support user interaction, and an execution model to facilitate parallel processing. We describe techniques to maintain consistency and real-time synchronization between the two models. We also provide solutions to reduce the memory complexity of large network models and to ensure data persistency and access efficiency for out-of-core processing.</td> |
| 7676 | </tr> |
| 7677 | |
| 7678 | |
| 7679 | |
| 7680 | <tr> |
| 7681 | <td valign="top">DOI</td> |
| 7682 | <td valign="top">10.1109/pads.2012.35</td> |
| 7683 | </tr> |
| 7684 | |
| 7685 | |
| 7686 | |
| 7687 | <tr> |
| 7688 | <td valign="top">URL</td> |
| 7689 | <td valign="top"><a href="http://dx.doi.org/10.1109/pads.2012.35">http://dx.doi.org/10.1109/pads.2012.35</a></td> |
7479 | | <td valign="top">Eleventh ACM Workshop on Hot Topics in Networks (HotNets '12)</td> |
| 7722 | <td valign="top">Proceedings of the 11th ACM Workshop on Hot Topics in Networks</td> |
| 7723 | </tr> |
| 7724 | |
| 7725 | <tr> |
| 7726 | <td valign="top">Location</td> |
| 7727 | <td valign="top">Redmond, Washington</td> |
| 7728 | </tr> |
| 7729 | |
| 7730 | <tr> |
| 7731 | <td valign="top">Publisher</td> |
| 7732 | <td valign="top">ACM</td> |
| 7733 | </tr> |
| 7734 | |
| 7735 | <tr> |
| 7736 | <td valign="top">Address</td> |
| 7737 | <td valign="top">New York, NY, USA</td> |
7487 | | |
7488 | | |
7489 | | |
7490 | | |
7491 | | <tr> |
7492 | | <td valign="top">URL</td> |
7493 | | <td valign="top"><a href="http://conferences.sigcomm.org/hotnets/2012/papers/hotnets12-final34.pdf">http://conferences.sigcomm.org/hotnets/2012/papers/hotnets12-final34.pdf</a></td> |
| 7745 | <tr> |
| 7746 | <td valign="top">Abstract</td> |
| 7747 | <td valign="top">Low latency is critical for interactive networked applications. But while we know how to scale systems to increase capacity, reducing latency --- especially the tail of the latency distribution --- can be much more difficult. We argue that the use of redundancy in the context of the wide-area Internet is an effective way to convert a small amount of extra capacity into reduced latency. By initiating redundant operations across diverse resources and using the first result which completes, redundancy improves a system's latency even under exceptional conditions. We demonstrate that redundancy can significantly reduce latency for small but critical tasks, and argue that it is an effective general-purpose strategy even on devices like cell phones where bandwidth is relatively constrained.</td> |
| 7748 | </tr> |
| 7749 | |
| 7750 | |
| 7751 | |
| 7752 | <tr> |
| 7753 | <td valign="top">DOI</td> |
| 7754 | <td valign="top">10.1145/2390231.2390234</td> |
| 7755 | </tr> |
| 7756 | |
| 7757 | |
| 7758 | |
| 7759 | <tr> |
| 7760 | <td valign="top">URL</td> |
| 7761 | <td valign="top"><a href="http://dx.doi.org/10.1145/2390231.2390234">http://dx.doi.org/10.1145/2390231.2390234</a></td> |
8047 | | <a class="EntryGoto" id="\\Ozçelik, İlker and Brooks, Richard R."></a> |
8048 | | <b class="myheading" style="position: relative; left: 5%;">\\Ozçelik, İlker and Brooks, Richard R.</b> |
8049 | | |
8050 | | <div class="BibEntry"> |
8051 | | |
8052 | | <table class="EntryTable" style="position: relative; left: 5%; width: 90%; border:thin solid black; border-spacing:10px;"> |
8053 | | |
8054 | | <li> |
8055 | | |
8056 | | |
8057 | | <tr> |
8058 | | <td valign="top">Author</td> |
8059 | | <td valign="top">\\Ozçelik, İlker and Brooks, Richard R.</td> |
8060 | | </tr> |
8061 | | |
8062 | | <tr> |
8063 | | <td valign="top">Title</td> |
8064 | | <td valign="top">Operational System Testing for Designed in Security</td> |
8065 | | </tr> |
8066 | | |
8067 | | <tr> |
8068 | | <td valign="top">Booktitle</td> |
8069 | | <td valign="top">Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop</td> |
8070 | | </tr> |
8071 | | |
8072 | | <tr> |
8073 | | <td valign="top">Location</td> |
8074 | | <td valign="top">Oak Ridge, Tennessee</td> |
8075 | | </tr> |
8076 | | |
8077 | | <tr> |
8078 | | <td valign="top">Publisher</td> |
8079 | | <td valign="top">ACM</td> |
8080 | | </tr> |
8081 | | |
8082 | | <tr> |
8083 | | <td valign="top">Address</td> |
8084 | | <td valign="top">New York, NY, USA</td> |
8085 | | </tr> |
8086 | | |
8087 | | <tr> |
8088 | | <td valign="top">Year</td> |
8089 | | <td valign="top">2013</td> |
8090 | | </tr> |
8091 | | |
8092 | | <tr> |
8093 | | <td valign="top">Abstract</td> |
8094 | | <td valign="top">To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.</td> |
8095 | | </tr> |
8096 | | |
8097 | | |
8098 | | |
8099 | | <tr> |
8100 | | <td valign="top">DOI</td> |
8101 | | <td valign="top">10.1145/2459976.2460038</td> |
8102 | | </tr> |
8103 | | |
8104 | | |
8105 | | |
8106 | | <tr> |
8107 | | <td valign="top">URL</td> |
8108 | | <td valign="top"><a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a></td> |
8109 | | </tr> |
8110 | | |
8111 | | |
8112 | | </li> |
8113 | | |
8114 | | </table></div><br><br> |
8115 | | |
8116 | | |
8117 | | |
8118 | | |