Version 31 (modified by 14 years ago) (diff) | ,
---|
Project Number
1783
Project Title
GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis
a.k.a. ExptsSecurity
Technical Contacts
Principal Investigator Xiaoyan Hong hxy@cs.ua.edu
Co-PI: Fei Hu fei@eng.ua.edu
Co-PI: Yang Xiao yangxiao@ieee.org
Participating Organizations
Department of Computer Science
The University of Alabama, Box 870290
Tuscaloosa, AL 35487
Department of Electrical and Computer Engineering
The University of Alabama, Box 870286
Tuscaloosa, AL 35487
GPO Liaison System Engineer
Vic Thomas vthomas@geni.net
Scope
This effort will help define GENI security requirements based on investigations through ProtoGENI experiments using at least two aggregates, one of which will be a wireless aggregate. The investigations will use network traffic capture and analysis under both normal and misbehaving situations. The well-articulated experiments will analyze the security and privacy characteristics, test GENI traffic recording and capture tools (following the results from Spiral I and II), and make suggestions for improvements to the ProtoGENI control framework with special emphasis on security improvements.
Current Capabilities
BRIEF descriptions of resources/functions/tools that are available to anyone in the GENI community
Milestones
MilestoneDate(ExptsSec: S2.a -)? Experiment design document
MilestoneDate(ExptsSec: S2.b)? Report on initial experimentation on ProtoGENI and revised experiment design.
MilestoneDate(ExptsSec: S2.c)? Report on experiments that validate vulnerability hypotheses/exploit vulnerabilities.
MilestoneDate(ExptsSec: S2.d)? Report on experiment design to extend the scope to wireless nodes.
MilestoneDate(ExptsSec: S3.a Report on results of experiments designed in Yr. 1)? Report on activities and deliverables for this milestone.
MilestoneDate(ExptsSec: S3.b Report on experiments designed in Milestone a)? Report of recent results and suggestions.
MilestoneDate(ExptsSec: S3.c Report of the experiments designed in Milestone b)?
MilestoneDate(ExptsSec: S3.d Experiment design document 3)?
Project Technical Documents
Description of planned security experiments
Revised description of planned security experiments
Presentation at GEC7
Report on initial experiments and findings
Report on experimentation exploiting vulnerabilities and validating vulnerability hypotheses
Presentation at GEC8
Spiral 2 Year-end Project Review
Report on experiment design to extend the scope to wireless nodes
Presentation at GEC9
Explore ProtoGENI Security Problems From Experimentation, Dawei Li, Xiaoyan Hong, a preparation for submission, Dec 2010.
Summary Findings and Suggestions
Presentation at GEC10
Report of recent results and suggestions.
Quarterly Status Reports
December 2009 report
March 2010 report
June 2010 report
GEC9 2010 report
GEC10 2011 report
Spiral 2 Connectivity
To be reviewed: Layer 3 connectivity to ProtoGENI clearinghouse. Layer 3 connectivity to provision resources used by experiments. Layer 2/3 connectivity between resources used in experiment.
Related Projects
Includes non-GENI projects.
Attachments (21)
-
QSR-Dec09.pdf (47.8 KB) - added by 15 years ago.
Quarterly Status Report --- Dec 2009
-
ExptsSec-designdoc-1.pdf (56.6 KB) - added by 15 years ago.
Description of experiments to be performed.
-
ExptsSec-designdoc-revised.pdf (87.6 KB) - added by 15 years ago.
Revised description of experiments to be performed
-
ExptsSec-gec7.pdf (118.0 KB) - added by 15 years ago.
GEC7 Presentation
-
ExptsSec-initialExpts-findings.pdf (131.7 KB) - added by 15 years ago.
Report of the initial experiments abd findings
-
ExptsSec-milestone3-findings.pdf (1.6 MB) - added by 14 years ago.
Report on Experimentation Exploiting Vulnerabilities and Validating Vulnerability Hypotheses
-
ExptsSec-gec8.pdf (2.7 MB) - added by 14 years ago.
Presentation at GEC8
-
Spiral2-Project-Review-ExptsSec-27Aug10.pptx (224.0 KB) - added by 14 years ago.
Spiral 2 Year-end Project Review
-
ExptsSec-milestone4.pdf (1.2 MB) - added by 14 years ago.
Report on experiment design to extend the scope to wireless nodes
-
exp-report-dec10-hong.pdf (800.6 KB) - added by 14 years ago.
Explore ProtoGENI Security Problems From Experimentation, Dawei Li, Xiaoyan Hong, a preparation for submission, Dec 2010
-
Gec9-ExptsSec.pdf (225.7 KB) - added by 14 years ago.
Presentation at GEC#9
-
Dec2010-summary.pdf (7.9 KB) - added by 14 years ago.
Summary Findings and Suggestions
-
GEC10-presentation.pdf (404.9 KB) - added by 14 years ago.
Presentation at GEC10
-
acmse2011_attachment_52.pdf (696.4 KB) - added by 14 years ago.
Report of recent results and suggestions
-
ExptsSec-milestone-s3c.pdf (157.1 KB) - added by 13 years ago.
Report of results and suggestions for ExptsSec: S3.c
-
Globecom11-ProtoGENI-cr.pdf (620.6 KB) - added by 13 years ago.
A Globecom 2011 paper delivered in the Milestone S3.c
-
ExptsSec-milestone-s3d-a.pdf (81.7 KB) - added by 13 years ago.
Results and design -- report of ExptsSec: S3.d
-
GEC12-exptsSeca.pdf (133.7 KB) - added by 13 years ago.
GEC12 presentation
-
ExptsSec-milestone-s4b.pdf (23.2 KB) - added by 13 years ago.
Results of analysis and experiments for s4.b.
-
Milestone-s4c-Report.pdf (137.0 KB) - added by 12 years ago.
report for S4.c -- analysis of key management and authentication
-
Milestone-s4d-Report.pdf (120.8 KB) - added by 12 years ago.
report of S4.d - suggestions on key management and access control