Changes between Version 44 and Version 45 of GENIBibliography
- Timestamp:
- 09/07/16 19:54:31 (8 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIBibliography
v44 v45 2356 2356 2357 2357 <li> 2358 <b>McGeer, Rick and Berman, Mark and Elliott, Chip and Ricci, Robert</b> 2359 , "The GENI Book." 2360 The GENI Book, Springer International Publishing, Cham, 2361 2016. 2362 doi:10.1007/978-3-319-33769-2. 2363 <a href="http://dx.doi.org/10.1007/978-3-319-33769-2">http://dx.doi.org/10.1007/978-3-319-33769-2</a> 2364 <br><br><b>Abstract: </b>This book, edited by four of the leaders of the National Science Foundation's Global Environment and Network Innovations (GENI) project, gives the reader a tour of the history, architecture, future, and applications of GENI. Built over the past decade by hundreds of leading computer scientists and engineers, GENI is a nationwide network used daily by thousands of computer scientists to explore the next Cloud and Internet and the applications and services they enable, which will transform our communities and our lives. Since by design it runs on existing computing and networking equipment and over the standard commodity Internet, it is poised for explosive growth and transformational impact over the next five years. Over 70 of the builders of GENI have contributed to present its development, architecture, and implementation, both as a standalone US project and as a federated peer with similar projects worldwide, forming the core of a worldwide network. Applications and services enabled by GENI, from smarter cities to intensive collaboration to immersive education, are discussed. The book also explores the concepts and technologies that transform the Internet from a shared transport network to a collection of ” slices” -- private, on-the-fly application-specific nationwide networks with guarantees of privacy and responsiveness. The reader will learn the motivation for building GENI and the experience of its precursor infrastructures, the architecture and implementation of the GENI infrastructure, its deployment across the United States and worldwide, the new network applications and services enabled by and running on the GENI infrastructure, and its international collaborations and extensions. This book is useful for academics in the networking and distributed systems areas, Chief Information Officers in the academic, private, and government sectors, and network and information architects. 2365 </li> 2366 <br> 2367 2368 2369 2370 <li> 2358 2371 <b>McGeer, Rick and Ricci, Robert</b> 2359 2372 , "The InstaGENI Project." … … 2565 2578 <li> 2566 2579 <b>Ozcelik, Ilker and Brooks, Richard R.</b> 2567 , "Performance Analysis of DDoS Detection Methods on Real Network."2568 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,2569 2012.2570 2571 2572 <br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.2573 </li>2574 <br>2575 2576 <li>2577 <b>Ozcelik, Ilker and Brooks, Richard R.</b>2578 , "Operational System Testing for Designed in Security."2579 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,2580 2013.2581 doi:10.1145/2459976.2460038.2582 <a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a>2583 <br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.2584 </li>2585 <br>2586 2587 <li>2588 <b>Ozcelik, Ilker and Brooks, Richard R.</b>2589 2580 , "Security experimentation using operational systems." 2590 2581 Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, ACM, New York, NY, USA, … … 2593 2584 <a href="http://dx.doi.org/10.1145/2179298.2179388">http://dx.doi.org/10.1145/2179298.2179388</a> 2594 2585 <br><br><b>Abstract: </b>Computers and Internet have evolved into necessary tools for our professional, personal and social lives. As a result of this growing dependence, there is a concern that these systems remain protected and available. This concern increases exponentially when considering systems such as smart power grids. Therefore, research should be conducted to develop effective ways of detecting system anomalies. To have realistic results, the studies should be tested on real systems. However, it is not possible to test these experiments on the live network. With the recent collaboration of Universities and research labs, a new experiment test bed has been established. As a result, experiments can now be implemented on real networks. In our study, we design an experiment to analyze Distributed Denial of Service Attacks (DDoS Attack) on a real network with real Internet traffic. The approach that we use in our study can easily be generalized to apply to smart power grids. 2586 </li> 2587 <br> 2588 2589 <li> 2590 <b>Ozcelik, Ilker and Brooks, Richard R.</b> 2591 , "Performance Analysis of DDoS Detection Methods on Real Network." 2592 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, 2593 2012. 2594 2595 2596 <br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic. 2597 </li> 2598 <br> 2599 2600 <li> 2601 <b>Ozcelik, Ilker and Brooks, Richard R.</b> 2602 , "Operational System Testing for Designed in Security." 2603 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, 2604 2013. 2605 doi:10.1145/2459976.2460038. 2606 <a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a> 2607 <br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities. 2595 2608 </li> 2596 2609 <br> … … 3588 3601 <li> 3589 3602 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b> 3603 , "PrimoGENI for hybrid network simulation and emulation experiments in GENI." 3604 Journal of Simulation, 3605 2012. 3606 doi:10.1057/jos.2012.5. 3607 <a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a> 3608 <br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach. 3609 </li> 3610 <br> 3611 3612 <li> 3613 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b> 3590 3614 , "PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI." 3591 3615 Principles of Advanced and Distributed Simulation (PADS), 2011 IEEE Workshop on, Nice, France, IEEE, … … 3594 3618 <a href="http://dx.doi.org/10.1109/pads.2011.5936747">http://dx.doi.org/10.1109/pads.2011.5936747</a> 3595 3619 <br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform -- a v̈irtual laboratory'' for the design, implementation and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines and local cluster nodes running virtual machines to seamlessly interoperate with the simulated network running within a designated s̈lice'' of resources. We show the results of our preliminary validation and performance studies to demonstrate the capabilities and limitations of our approach. 3596 </li>3597 <br>3598 3599 <li>3600 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b>3601 , "PrimoGENI for hybrid network simulation and emulation experiments in GENI."3602 Journal of Simulation,3603 2012.3604 doi:10.1057/jos.2012.5.3605 <a href="http://dx.doi.org/10.1057/jos.2012.5">http://dx.doi.org/10.1057/jos.2012.5</a>3606 <br><br><b>Abstract: </b>The Global Environment for Network Innovations (GENI) is a community-driven research and development effort to build a collaborative and exploratory network experimentation platform—a 'virtual laboratory' for the design, implementation, and evaluation of future networks. The PrimoGENI project enables real-time network simulation by extending an existing network simulator to become part of the GENI federation to support large-scale experiments involving physical, simulated, and emulated network entities. In this paper, we describe a novel design of PrimoGENI, which aims at supporting realistic, scalable, and flexible network experiments with real-time simulation and emulation capabilities. We present a flexible emulation infrastructure that allows both remote client machines, local cluster nodes running virtual machines, and external networks to seamlessly interoperate with the simulated network running within a designated 'slice' of resources. We present the results of our preliminary validation and performance studies to demonstrate the capabilities as well as limitations of our approach.3607 3620 </li> 3608 3621 <br> … … 6063 6076 6064 6077 <li> 6078 <b>McGeer, Rick and Berman, Mark and Elliott, Chip and Ricci, Robert</b> 6079 , "The GENI Book." 6080 The GENI Book, Springer International Publishing, Cham, 6081 2016. 6082 doi:10.1007/978-3-319-33769-2. 6083 </li> 6084 <br> 6085 6086 6087 6088 <li> 6065 6089 <b>McGeer, Rick and Ricci, Robert</b> 6066 6090 , "The InstaGENI Project." … … 6240 6264 <li> 6241 6265 <b>Ozcelik, Ilker and Brooks, Richard R.</b> 6242 , "Performance Analysis of DDoS Detection Methods on Real Network."6243 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,6244 2012.6245 6246 </li>6247 <br>6248 6249 <li>6250 <b>Ozcelik, Ilker and Brooks, Richard R.</b>6251 , "Operational System Testing for Designed in Security."6252 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,6253 2013.6254 doi:10.1145/2459976.2460038.6255 </li>6256 <br>6257 6258 <li>6259 <b>Ozcelik, Ilker and Brooks, Richard R.</b>6260 6266 , "Security experimentation using operational systems." 6261 6267 Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, Oak Ridge, Tennessee, ACM, New York, NY, USA, 6262 6268 2011. 6263 6269 doi:10.1145/2179298.2179388. 6270 </li> 6271 <br> 6272 6273 <li> 6274 <b>Ozcelik, Ilker and Brooks, Richard R.</b> 6275 , "Performance Analysis of DDoS Detection Methods on Real Network." 6276 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles, 6277 2012. 6278 6279 </li> 6280 <br> 6281 6282 <li> 6283 <b>Ozcelik, Ilker and Brooks, Richard R.</b> 6284 , "Operational System Testing for Designed in Security." 6285 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA, 6286 2013. 6287 doi:10.1145/2459976.2460038. 6264 6288 </li> 6265 6289 <br> … … 7105 7129 <li> 7106 7130 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b> 7131 , "PrimoGENI for hybrid network simulation and emulation experiments in GENI." 7132 Journal of Simulation, 7133 2012. 7134 doi:10.1057/jos.2012.5. 7135 </li> 7136 <br> 7137 7138 <li> 7139 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b> 7107 7140 , "PrimoGENI: Integrating Real-Time Network Simulation and Emulation in GENI." 7108 7141 Principles of Advanced and Distributed Simulation (PADS), 2011 IEEE Workshop on, Nice, France, IEEE, 7109 7142 2011. 7110 7143 doi:10.1109/pads.2011.5936747. 7111 </li>7112 <br>7113 7114 <li>7115 <b>Van Vorst, N. and Erazo, M. and Liu, J.</b>7116 , "PrimoGENI for hybrid network simulation and emulation experiments in GENI."7117 Journal of Simulation,7118 2012.7119 doi:10.1057/jos.2012.5.7120 7144 </li> 7121 7145 <br> … … 7541 7565 7542 7566 <!-- End HTML to be inserted into wiki page. --> 7543 7544 7567 }}}