Changes between Version 51 and Version 52 of GENIBibliography


Ignore:
Timestamp:
03/29/17 13:02:14 (7 years ago)
Author:
Mark Berman
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GENIBibliography

    v51 v52  
    799799
    800800<li>
     801<b>Castillo, Eduardo J. and Mountrouidou, Xenia and Li, Xiangyang</b>
     802, &quot;Time Lord: Covert Timing Channel Implementation and Realistic Experimentation.&quot;
     803Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, Seattle, Washington, USA, ACM, New York, NY, USA,
     8042017.
     805doi:10.1145/3017680.3022463.
     806<a href="http://dx.doi.org/10.1145/3017680.3022463">http://dx.doi.org/10.1145/3017680.3022463</a>
     807<br><br><b>Abstract: </b>Covert channels are unique methods for exchanging messages, since they permit sending information secretly. Unlike encryption, covert communication allows to send information covertly, using an otherwise legitimate medium of transfer, thus it is not apparent that a message is being transferred at all. There is limited research on Covert Timing Channels (CTCs), i.e., channels that manipulate packet inter-arrival time to exchange messages based on a certain encoding. Implementing and testing CTCs in real network environments is lacking in the current literature due to sensitivity to network delays that significantly affects this type of communication. Thus, it is important to implement CTC communication to analyze the challenges of creating robust, efficient, and undetectable channels in real life situations. It is also paramount to test these implementations in a wide range of realistic network conditions. In this research, we have developed and tested two implementations of CTCs. The first implementation is based on [1] using standard bits encoding and ASCII for simplicity and robustness. This implementation suffers from easy detection. On the other hand, we developed the second implementation with goal to make the channel undetectable by using encoding with five different delays, i.e., symbols, where five symbols in a specific order correspond to one letter of the alphabet. This implementation has sufficient randomness to be undetected with standard statistical mechanisms. We have tested both implementations on local networks, the Global Environment for Network Innovations (GENI) controlled environment, networks across states in the US, and internationally.
     808</li>
     809<br>
     810
     811
     812
     813<li>
    801814<b>Chakrabortty, Aranya and Xin, Yufeng</b>
    802815, &quot;Hardware-in-the-Loop Simulations and Verifications of Smart Power Systems Over an Exo-GENI Testbed.&quot;
     
    928941<li>
    929942<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
     943, &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot;
     944Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
     9452015.
     946doi:10.1109/milcom.2015.7357519.
     947<a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a>
     948<br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability.
     949</li>
     950<br>
     951
     952<li>
     953<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    930954, &quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot;
    931955Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,
     
    937961<br>
    938962
    939 <li>
    940 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    941 , &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot;
    942 Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
    943 2015.
    944 doi:10.1109/milcom.2015.7357519.
    945 <a href="http://dx.doi.org/10.1109/milcom.2015.7357519">http://dx.doi.org/10.1109/milcom.2015.7357519</a>
    946 <br><br><b>Abstract: </b>Software Defined Networking (SDN) has the potential to enable novel security applications that support flexible, on-demand deployment of system elements. It can offer targeted forensic evidence collection and investigation of computer network attacks. Such unique capabilities are instrumental to network intrusion detection that is challenged by large volumes of data and complex network topologies. This paper presents an innovative approach that coordinates distributed network traffic Monitors and attack Correlators supported by Open Virtual Switches (OVS). The Monitors conduct anomaly detection and the Correlators perform deep packet inspection for attack signature recognition. These elements take advantage of complementary views and information availability on both the data and control planes. Moreover, they collaboratively look for network flooding attack signature constituents that possess different characteristics in the level of information abstraction. Therefore, this approach is able to not only quickly raise an alert against potential threats, but also follow it up with careful verification to reduce false alarms. We experiment with this SDN-supported collaborative approach to detect TCP SYN flood attacks on the Global Environment for Network Innovations (GENI), a realistic virtual testbed. The response times and detection accuracy, in the context of a small to medium corporate network, have demonstrated its effectiveness and scalability.
    947 </li>
    948 <br>
    949 
    950 
     963
     964
     965<li>
     966<b>Chin, Tommy and Xiong, Kaiqi</b>
     967, &quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot;
     968Wireless Algorithms, Systems, and Applications, Springer International Publishing,
     9692016.
     970doi:10.1007/978-3-319-42836-9&#x005F;43.
     971<a href="http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43">http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43</a>
     972<br><br><b>Abstract: </b>This paper addresses one major concern on how to secure the location information of a base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting or damaging the wireless base station can be catastrophic for a WSN. To aid in the mitigation of this challenge, we present Moving Proximity Base Station Defense (MPBSD), a Moving Target Defense (MTD) approach to concealing the location of a base station within a WSN. In this approach, we employ multiple base stations to serve a WSN where one of the multiple base stations is elected to serve the WSN in a specific period of time. Specifically, our approach periodically changes the designation over a period of time to provide obscurity in the location information of the base station. We further evaluate MPBSD using a real-world testbed environment utilizing Wi-Fi frequencies. Our results show that MPBSD is an effective MTD approach to securing base stations for a WSN in term of sensory performance such as end-to-end delay.
     973</li>
     974<br>
    951975
    952976<li>
     
    958982<a href="http://dx.doi.org/10.1109/eitec.2016.7503690">http://dx.doi.org/10.1109/eitec.2016.7503690</a>
    959983<br><br><b>Abstract: </b>Supervisory Control and Data Acquisition (SCADA) systems are critical assets to public utility and manufacturing organizations. These systems, although critical, are prone to numerous cyber security related threats and attacks. To combat such challenges, we propose a Dynamic Generated Containment System (DGCS), a moving target defense model as a method of threat evasion. Under the proposed approach, we employ the use of intrusion detection systems (IDS) in conjunction with virtualization solution - Docker. The proposed approach provides an individual Docker container for each threat detected by our IDS. We conduct several experiments using high performance computing systems to measure and demonstrate our proposed approach.
    960 </li>
    961 <br>
    962 
    963 <li>
    964 <b>Chin, Tommy and Xiong, Kaiqi</b>
    965 , &quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot;
    966 Wireless Algorithms, Systems, and Applications, Springer International Publishing,
    967 2016.
    968 doi:10.1007/978-3-319-42836-9&#x005F;43.
    969 <a href="http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43">http://dx.doi.org/10.1007/978-3-319-42836-9&#x005F;43</a>
    970 <br><br><b>Abstract: </b>This paper addresses one major concern on how to secure the location information of a base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting or damaging the wireless base station can be catastrophic for a WSN. To aid in the mitigation of this challenge, we present Moving Proximity Base Station Defense (MPBSD), a Moving Target Defense (MTD) approach to concealing the location of a base station within a WSN. In this approach, we employ multiple base stations to serve a WSN where one of the multiple base stations is elected to serve the WSN in a specific period of time. Specifically, our approach periodically changes the designation over a period of time to provide obscurity in the location information of the base station. We further evaluate MPBSD using a real-world testbed environment utilizing Wi-Fi frequencies. Our results show that MPBSD is an effective MTD approach to securing base stations for a WSN in term of sensory performance such as end-to-end delay.
    971984</li>
    972985<br>
     
    17021715<li>
    17031716<b>Huang, Shufeng and Griffioen, James and Calvert, Ken</b>
     1717, &quot;PVNs: Making virtualized network infrastructure usable.&quot;
     17182012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS),
     17192012.
     1720
     1721<a href="http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7846352">http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=7846352</a>
     1722<br><br><b>Abstract: </b>Network virtualization is becoming a fundamental building block of future Internet architectures. Although the underlying network infrastructure needed to dynamically create and deploy custom virtual networks is rapidly taking shape ( e.g., GENI), constructing and using a virtual network is still a challenging and labor intensive task, one best left to experts. In this paper, we present the concept of a Packaged Virtual Network (PVN), that enables normal users to easily download, deploy and use application-specific virtual networks. At the heart of our approach is a PVN Hypervisor that ” runs” a PVN by allocating the virtual network resources needed by the PVN and then connecting the PVN's participants into the network on demand. To demonstrate our PVN approach, we implemented a multicast PVN that runs on the PVN hypervisor prototype using ProtoGENI as the underlying virtual network, allowing average users to create their own private multicast network.
     1723</li>
     1724<br>
     1725
     1726<li>
     1727<b>Huang, Shufeng and Griffioen, James and Calvert, Ken</b>
    17041728, &quot;PVNs: Making Virtualized Network Infrastructure Usable.&quot;
    17051729ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '12),
     
    18061830<li>
    18071831<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
     1832, &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot;
     1833Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
     18342015.
     1835doi:10.1109/iccw.2015.7247436.
     1836<a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a>
     1837<br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates.
     1838</li>
     1839<br>
     1840
     1841<li>
     1842<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    18081843, &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot;
    18091844NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
     
    18121847<a href="http://dx.doi.org/10.1109/noms.2016.7502805">http://dx.doi.org/10.1109/noms.2016.7502805</a>
    18131848<br><br><b>Abstract: </b>Dynamic Adaptive Streaming over HTTP (DASH) enables the video player to adapt the bitrate of the video while streaming to ensure playback without interruptions even with varying throughput. A DASH server hosts multiple representations of the same video, each of which is broken down into small segments of fixed playback duration. The video bitrate adaptation is purely driven by the player at the endhost. Typically, the player employs an Adaptive Bitrate (ABR) algorithm, that determines the most appropriate representation for the next segment to be downloaded, based on the current network conditions and user preferences. The aim of an ABR algorithm is to dynamically manage the Quality of Experience (QoE) of the user during the playback. ABR algorithms manage the QoE by maximizing the bitrate while at the same time trying to minimize the other QoE metrics: playback start time, duration and number of buffering events, and the number of bitrate switching events. Typically, the ABR algorithms manage the QoE by using the measured network throughput and buffer occupancy to adapt the playback bitrate. However, due to the video encoding schemes employed, the sizes of the individual segments may vary significantly. For low bandwidth networks, fluctuation in the segment sizes results in inaccurate estimation the expected segment fetch times, thereby resulting in inaccurate estimation of the optimum bitrate. In this paper we demonstrate how the Segment-Aware Rate Adaptation (SARA) algorithm, that considers the measured throughput, buffer occupancy, and the variation in segment sizes helps in better management of the users' QoE in a DASH system. By comparing with a typical throughput-based and buffer-based adaptation algorithm under varying network conditions, we demonstrate that SARA manages the QoE better, especially in a low bandwidth network. We also developed AStream, an open-source Python-based emulated DASH-video player that was used to evaluate three different ABR algor- thms and measure the QoE metrics with each of them.
    1814 </li>
    1815 <br>
    1816 
    1817 <li>
    1818 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    1819 , &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot;
    1820 Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
    1821 2015.
    1822 doi:10.1109/iccw.2015.7247436.
    1823 <a href="http://dx.doi.org/10.1109/iccw.2015.7247436">http://dx.doi.org/10.1109/iccw.2015.7247436</a>
    1824 <br><br><b>Abstract: </b>Dynamic adaptive HTTP (DASH) based streaming is steadily becoming the most popular online video streaming technique. DASH streaming provides seamless playback by adapting the video quality to the network conditions during the video playback. A DASH server supports adaptive streaming by hosting multiple representations of the video and each representation is divided into small segments of equal playback duration. At the client end, the video player uses an adaptive bitrate selection (ABR) algorithm to decide the bitrate to be selected for each segment depending on the current network conditions. Currently, proposed ABR algorithms ignore the fact that the segment sizes significantly vary for a given video bitrate. Due to this, even though an ABR algorithm is able to measure the network bandwidth, it may fail to predict the time to download the next segment In this paper, we propose a segment-aware rate adaptation (SARA) algorithm that considers the segment size variation in addition to the estimated path bandwidth and the current buffer occupancy to accurately predict the time required to download the next segment We also developed an open source Python based emulated DASH video player, that was used to compare the performance of SARA and a basic ABR. Our results show that SARA provides a significant gain over the basic algorithm in the video quality delivered, without noticeably impacting the video switching rates.
    18251849</li>
    18261850<br>
     
    19862010<li>
    19872011<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
     2012, &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot;
     2013First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
     20142012.
     2015
     2016
     2017<br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.
     2018</li>
     2019<br>
     2020
     2021<li>
     2022<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    19882023, &quot;Network capabilities of cloud services for a real time scientific application.&quot;
    1989202437th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE,
     
    19922027<a href="http://dx.doi.org/10.1109/lcn.2012.6423665">http://dx.doi.org/10.1109/lcn.2012.6423665</a>
    19932028<br><br><b>Abstract: </b>Dedicating high-end servers for executing scientific applications that run intermittently, such as severe weather detection or generalized weather forecasting, wastes resources. While the Infrastructure-as-a-Service (IaaS) model used by today's cloud platforms is well-suited for the bursty computational demands of these applications, it is unclear if the network capabilities of today's cloud platforms are sufficient. In this paper, we analyze the networking capabilities of multiple commercial (Amazon's EC2 and Rackspace) and research (GENICloud and ExoGENI cloud) platforms in the context of a Nowcasting application, a forecasting algorithm for highly accurate, near-term, e.g., 5-20 minutes, weather predictions. The application has both computational and network requirements. While it executes rarely, whenever severe weather approaches, it benefits from an IaaS model; However, since its results are time-critical, enough bandwidth must be available to transmit radar data to cloud platforms before it becomes stale. We conduct network capacity measurements between radar sites and cloud platforms throughout the country. Our results indicate that ExoGENI cloud performs the best for both serial and parallel data transfer with an average throughput of 110.22 Mbps and 17.2 Mbps, respectively. We also found that the cloud services perform better in the distributed data transfer case, where a subset of nodes transmit data in parallel to a cloud instance. Ultimately, we conclude that commercial and research clouds are capable of providing sufficient bandwidth for our real-time Nowcasting application.
    1994 </li>
    1995 <br>
    1996 
    1997 <li>
    1998 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    1999 , &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot;
    2000 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
    2001 2012.
    2002 
    2003 
    2004 <br><br><b>Abstract: </b>Dedicating high end servers for short-term execution of scientific applications such as weather forecasting wastes resources. Cloud platforms IaaS model seems well suited for applications which are executed on an irregular basis and for short duration. In this paper, we evaluate the performance of research testbed cloud platforms such as GENICloud and ORCA cloud clusters for our real-time scientific application of short-term weather forecasting called Nowcasting. In this paper, we evaluate the network capabilities of these research cloud testbeds for our real-time application of weather forecasting. In addition, we evaluate the computation time of executing Nowcasting on each cloud platform for weather data collected from real weather events. We also evaluate the total time taken to generate and transmit short-term forecast images to end users with live data from our own radar on campus. We also compare the performance of each of these clusters for Nowcasting with commercial cloud services such as Amazon's EC2. The results obtained from our measurement show that cloud testbeds are suitable for real-time application experiments to be carried out on a cloud platform.
    20052029</li>
    20062030<br>
     
    23852409<li>
    23862410<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
     2411, &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot;
     2412Teletraffic Congress (ITC), 2014 26th International, IEEE,
     24132014.
     2414doi:10.1109/itc.2014.6932970.
     2415<a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a>
     2416<br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs.
     2417</li>
     2418<br>
     2419
     2420<li>
     2421<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    23872422, &quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot;
    23882423Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,
     
    23912426<a href="http://dx.doi.org/10.1145/2955193.2955194">http://dx.doi.org/10.1145/2955193.2955194</a>
    23922427<br><br><b>Abstract: </b>Providing services for multiple tenants within a single or federated distributed cloud environment requires a variety of special considerations related to network design, provisioning, and operations. Especially important are multiple topics concerning the implementation of multiple parallel programmable virtual networks for large numbers of tenants, who require autonomous management, control, and data planes. This paper provides an overview of some of the challenges that arise from developing and implementing parallel programmable virtual networks, describes experiences with several experimental techniques for addressing those challenges based on large scale distributed testbeds, and presents the results of the experiments that were conducted. Distributed environments used include a distributed cloud testbed, the Chameleon Cloud, sponsored by the National Science Foundation's NSFCloud program, the NSF's Global Environment for Network Innovations (GENI), an international distributed OpenFlow testbed, and the Open Science Data Cloud.
    2393 </li>
    2394 <br>
    2395 
    2396 <li>
    2397 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    2398 , &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot;
    2399 Teletraffic Congress (ITC), 2014 26th International, IEEE,
    2400 2014.
    2401 doi:10.1109/itc.2014.6932970.
    2402 <a href="http://dx.doi.org/10.1109/itc.2014.6932970">http://dx.doi.org/10.1109/itc.2014.6932970</a>
    2403 <br><br><b>Abstract: </b>Software Defined Networks (SDNs), primarily based on OpenFlow, are being deployed in single domain networks around the world. The popularity of SDNs has given rise to multiple considerations about designing, implementing, and operating Software-Defined Network Exchanges (SDXs), to enable SDNs to interconnect SDN islands and to extend SDNs across multiple domains. These goals can be accomplished only by developing new techniques that extend the single domain orientation of current SDN/OpenFlow approaches to include capabilities for multidomain control, including those for resource discovery, signaling, and dynamic provisioning. Several networking research communities have begun to investigate these concepts. Early architectural models of SDXs have been designed and implemented as prototypes. These SDXs are being used to conduct experiments and to demonstrate the potentials of SDXs.
    24042428</li>
    24052429<br>
     
    25902614
    25912615<li>
     2616<b>Mehto, RInkel and Sachdeva, Monika and Behal, Sunny</b>
     2617, &quot;Performance Measurement of Web Services under UDP Attack using GENI Testbed.&quot;
     2618International Journal of Innovations in Engineering and Technology (IJIET),
     26192016.
     2620
     2621<a href="http://ijiet.com/wp-content/uploads/2017/01/64.pdf">http://ijiet.com/wp-content/uploads/2017/01/64.pdf</a>
     2622<br><br><b>Abstract: </b>Today, Internet is the primary medium for communication which is used by number of users across the Network. As one of the major security problems in the current Internet, a denial-of-service (DoS) attack always attempts to stop the victim from serving legitimate users. A Distributed Denial of Service (DDoS) attack is a DoS attack utilizing multiple distributed attack sources. The majority of DDoS attacks target the network and transport layers. During study of all work we came to know that most of the researchers had done similar work on Simulation based techniques. In this paper, we have measured the performance of Web services under DDoS attack using Real time testbed (GENI). GENI is Global Environment for network innovations. In this work, GENI test bed has been explored and topology has been created on which HTTP legitimate traffic and UDP attack traffic have been generated. Another application i.e User Datagram Protocol (UDP) is simplest Transport Layer communication protocol available of the TCP/IP protocol suite. It involves minimum amount of communication mechanism. Avg.Response Time , Avg.Round Trip Time (RTT) and Throughput in terms of good-put and bad-put is computed to measure impact of DDoS attacks on Web HTTP services.
     2623</li>
     2624<br>
     2625
     2626
     2627
     2628<li>
    25922629<b>Mekky, H. and Jin, Cheng and Zhang, Zhi-Li</b>
    25932630, &quot;VIRO-GENI: SDN-Based Approach for a Non-IP Protocol in GENI.&quot;
     
    27792816
    27802817<br><br><b>Abstract: </b>Distributed Denial of Service (DDoS) attacks are major security threats to the Internet. The distributed structure of these attacks makes it difficult to distinguish between legitimate and attack traffic, making detection difficult. In addition to this challenge, researchers also have to study and find countermeasures against these attacks without using an operational network for testing, since attacks on operational networks inconvenience users. In this paper, we propose a method to perform DDoS analysis on real hardware using real traffic without jeopardizing the original network. We implement our experiments on the Geni testbed using Openflow. We present results from DDoS detection methods using operational traffic.
    2781 </li>
    2782 <br>
    2783 
    2784 <li>
    2785 <b>Ozcelik, Ilker and Brooks, Richard R.</b>
    2786 , &quot;Operational System Testing for Designed in Security.&quot;
    2787 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
    2788 2013.
    2789 doi:10.1145/2459976.2460038.
    2790 <a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a>
    2791 <br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.
    27922818</li>
    27932819<br>
     
    28042830<br>
    28052831
     2832<li>
     2833<b>Ozcelik, Ilker and Brooks, Richard R.</b>
     2834, &quot;Operational System Testing for Designed in Security.&quot;
     2835Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
     28362013.
     2837doi:10.1145/2459976.2460038.
     2838<a href="http://dx.doi.org/10.1145/2459976.2460038">http://dx.doi.org/10.1145/2459976.2460038</a>
     2839<br><br><b>Abstract: </b>To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.
     2840</li>
     2841<br>
     2842
    28062843
    28072844
     
    33403377
    33413378<li>
     3379<b>Sevinc, Soner</b>
     3380, &quot;A Framework for Access Control and Resource Allocation for Federations (Doctoral Dissertation).&quot;
     3381Princeton, NJ,
     33822016.
     3383
     3384<a href="http://arks.princeton.edu/ark:/88435/dsp01n583xx39b">http://arks.princeton.edu/ark:/88435/dsp01n583xx39b</a>
     3385<br><br><b>Abstract: </b>In this thesis we address the access control and resource allocation problems in computational federations, such as testbeds and cloud computing federations. The computational federations of today are growing in their number of participant organizations, where one challenge is to allow organizations participate autonomously by expressing how much of their resources should be used and by whom, through complex policies. In addition, such organizations should be able to exchange resources with any other organizations without necessarily knowing all of them beforehand. We introduce our federation framework which allows to build federations in varying complexities easily, by synthesizing trust management, policy languages and resource discovery into a single system. Although these three have been studied separately in the past, we show that they are in fact related, and can be viewed as separate layers of a more general system. We argue that complex agreements that involve indirect trust relationships is one key way to enable resource exchange in a federation with numerous organizations, and this can be realized by our synthesis architecture that provides usability as well as expressiveness. As part of our framework, federation policy language (FPL) is used to express both the security and allocation policies, by providing simple primitives such as contracts that hide the underlying complexity. FPL primitives allow system administrators to express policies such as indirect trust and resource restrictions within the same construct. Underneath, FPL uses our distributed trust management system (CERTDIST) to implement and impose policy primitives. CERTDIST uses digital certificates to allow or deny resource requests and a DHT for complex distributive proofs in an e!cient way. The Resource discovery part of our framework (CODAL) is layered on top of FPL, and uses contracts to discover peers, FPL security and allocation policies to authorize for resources that are located possibly in many di↵erent organizations. We evaluate the federation framework with a realistic emulation of a large scale federation using real PlanetLab traces, that shows that complex policies can be expressed with a minimal amount of code, and we can e!ciently perform the access control and resource discovery operations in a federation.
     3386</li>
     3387<br>
     3388
     3389
     3390
     3391<li>
    33423392<b>Shamim, Sumaira and Fei, Zongming</b>
    33433393, &quot;Evaluating a QoS aware path selection service using the GENI network.&quot;
     
    37303780
    37313781<li>
     3782<b>Turi, Leo</b>
     3783, &quot;Contribution to the Federation of the asynchronous SmartSantander service layer within the European Fed4FIRE context (Master's Thesis).&quot;
     3784
     37852015.
     3786
     3787<a href="http://tesi.cab.unipd.it/49627/1/turi&#x005F;leo&#x005F;tesi.pdf">http://tesi.cab.unipd.it/49627/1/turi&#x005F;leo&#x005F;tesi.pdf</a>
     3788<br><br><b>Abstract: </b>This thesis is a contribution to the federation of asynchronous SmartSantander service layer within the European Fed4FIRE context. The thesis was developed in a Smart City background, and its main aims were both to gain knowledge of how Smart Cities, Testbeds and Federations of Testbeds are structured by working on a real deployed system, i.e. SmartSantander framework and Fed4FIRE federation, and to contribute with some of the components required for the integration. The technical development carried out as part of this thesis mainly deals with three aspects of the testbed: resource discovery, asynchronous subscription management and measurement data delivery. As a result, a series of software components have been deployed on SmartSantander hardware and it will be running as part of the complete framework on the next testbed iteration. Together, they provide a new way of accessing to the sensor information SmartSantander can provide. During the development phase, we experimented with real hardware and software and worked with o -the-shelf technologies for testbed and federations. The complete work was developed at the University of Cantabria in collaboration with the TLMAT laboratory, which currently presides over SmartSantander.
     3789</li>
     3790<br>
     3791
     3792
     3793
     3794<li>
    37323795<b>Turner, Jonathan S.</b>
    37333796, &quot;A proposed architecture for the GENI backbone platform.&quot;
     
    50215084
    50225085<li>
     5086<b>Castillo, Eduardo J. and Mountrouidou, Xenia and Li, Xiangyang</b>
     5087, &quot;Time Lord: Covert Timing Channel Implementation and Realistic Experimentation.&quot
     5088Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, Seattle, Washington, USA, ACM, New York, NY, USA,
     50892017.
     5090doi:10.1145/3017680.3022463.
     5091</li>
     5092<br>
     5093
     5094
     5095
     5096<li>
    50235097<b>Chakrabortty, Aranya and Xin, Yufeng</b>
    50245098, &quot;Hardware-in-the-Loop Simulations and Verifications of Smart Power Systems Over an Exo-GENI Testbed.&quot
     
    51305204<li>
    51315205<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
     5206, &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot
     5207Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
     52082015.
     5209doi:10.1109/milcom.2015.7357519.
     5210</li>
     5211<br>
     5212
     5213<li>
     5214<b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    51325215, &quot;Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN).&quot
    51335216Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th International Conference on, IEEE,
     
    51375220<br>
    51385221
    5139 <li>
    5140 <b>Chin, Tommy and Mountrouidou, Xenia and Li, Xiangyang and Xiong, Kaiqi</b>
    5141 , &quot;An SDN-supported collaborative approach for DDoS flooding detection and containment.&quot
    5142 Military Communications Conference, MILCOM 2015 - 2015 IEEE, IEEE,
    5143 2015.
    5144 doi:10.1109/milcom.2015.7357519.
    5145 </li>
    5146 <br>
    5147 
    5148 
     5222
     5223
     5224<li>
     5225<b>Chin, Tommy and Xiong, Kaiqi</b>
     5226, &quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot
     5227Wireless Algorithms, Systems, and Applications, Springer International Publishing,
     52282016.
     5229doi:10.1007/978-3-319-42836-9&#x005F;43.
     5230</li>
     5231<br>
    51495232
    51505233<li>
     
    515452372016.
    51555238doi:10.1109/eitec.2016.7503690.
    5156 </li>
    5157 <br>
    5158 
    5159 <li>
    5160 <b>Chin, Tommy and Xiong, Kaiqi</b>
    5161 , &quot;MPBSD: A Moving Target Defense Approach for Base Station Security in Wireless Sensor Networks.&quot
    5162 Wireless Algorithms, Systems, and Applications, Springer International Publishing,
    5163 2016.
    5164 doi:10.1007/978-3-319-42836-9&#x005F;43.
    51655239</li>
    51665240<br>
     
    57845858<li>
    57855859<b>Huang, Shufeng and Griffioen, James and Calvert, Ken</b>
     5860, &quot;PVNs: Making virtualized network infrastructure usable.&quot
     58612012 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS),
     58622012.
     5863
     5864</li>
     5865<br>
     5866
     5867<li>
     5868<b>Huang, Shufeng and Griffioen, James and Calvert, Ken</b>
    57865869, &quot;PVNs: Making Virtualized Network Infrastructure Usable.&quot
    57875870ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS '12),
     
    58725955<li>
    58735956<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
     5957, &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot
     5958Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
     59592015.
     5960doi:10.1109/iccw.2015.7247436.
     5961</li>
     5962<br>
     5963
     5964<li>
     5965<b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    58745966, &quot;QoE management in DASH systems using the segment aware rate adaptation algorithm.&quot
    58755967NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium, IEEE,
    587659682016.
    58775969doi:10.1109/noms.2016.7502805.
    5878 </li>
    5879 <br>
    5880 
    5881 <li>
    5882 <b>Juluri, Parikshit and Tamarapalli, Venkatesh and Medhi, Deep</b>
    5883 , &quot;SARA: Segment aware rate adaptation algorithm for dynamic adaptive streaming over HTTP.&quot
    5884 Communication Workshop (ICCW), 2015 IEEE International Conference on, IEEE,
    5885 2015.
    5886 doi:10.1109/iccw.2015.7247436.
    58875970</li>
    58885971<br>
     
    60246107<li>
    60256108<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
     6109, &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot
     6110First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
     61112012.
     6112
     6113</li>
     6114<br>
     6115
     6116<li>
     6117<b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    60266118, &quot;Network capabilities of cloud services for a real time scientific application.&quot
    6027611937th Annual IEEE Conference on Local Computer Networks, Clearwater Beach, FL, USA, IEEE,
    602861202012.
    60296121doi:10.1109/lcn.2012.6423665.
    6030 </li>
    6031 <br>
    6032 
    6033 <li>
    6034 <b>Krishnappa, Dilip K. and Lyons, Eric and Irwin, David and Zink, Michael</b>
    6035 , &quot;Performance of GENI Cloud Testbeds for Real Time Scientific Application.&quot
    6036 First GENI Research and Educational Experiment Workshop (GREE 2012), Los Angeles,
    6037 2012.
    6038 
    60396122</li>
    60406123<br>
     
    63616444<li>
    63626445<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
     6446, &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot
     6447Teletraffic Congress (ITC), 2014 26th International, IEEE,
     64482014.
     6449doi:10.1109/itc.2014.6932970.
     6450</li>
     6451<br>
     6452
     6453<li>
     6454<b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    63636455, &quot;Next Generation Virtual Network Architecture for Multi-tenant Distributed Clouds: Challenges and Emerging Techniques.&quot
    63646456Proceedings of the 4th Workshop on Distributed Cloud Computing, Chicago, Illinois, ACM, New York, NY, USA,
    636564572016.
    63666458doi:10.1145/2955193.2955194.
    6367 </li>
    6368 <br>
    6369 
    6370 <li>
    6371 <b>Mambretti, Joe and Chen, Jim and Yeh, Fei</b>
    6372 , &quot;Software-Defined Network Exchanges (SDXs): Architecture, services, capabilities, and foundation technologies.&quot
    6373 Teletraffic Congress (ITC), 2014 26th International, IEEE,
    6374 2014.
    6375 doi:10.1109/itc.2014.6932970.
    63766459</li>
    63776460<br>
     
    65346617
    65356618<li>
     6619<b>Mehto, RInkel and Sachdeva, Monika and Behal, Sunny</b>
     6620, &quot;Performance Measurement of Web Services under UDP Attack using GENI Testbed.&quot
     6621International Journal of Innovations in Engineering and Technology (IJIET),
     66222016.
     6623
     6624</li>
     6625<br>
     6626
     6627
     6628
     6629<li>
    65366630<b>Mekky, H. and Jin, Cheng and Zhang, Zhi-Li</b>
    65376631, &quot;VIRO-GENI: SDN-Based Approach for a Non-IP Protocol in GENI.&quot
     
    669367872012.
    66946788
    6695 </li>
    6696 <br>
    6697 
    6698 <li>
    6699 <b>Ozcelik, Ilker and Brooks, Richard R.</b>
    6700 , &quot;Operational System Testing for Designed in Security.&quot
    6701 Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
    6702 2013.
    6703 doi:10.1145/2459976.2460038.
    67046789</li>
    67056790<br>
     
    67146799<br>
    67156800
     6801<li>
     6802<b>Ozcelik, Ilker and Brooks, Richard R.</b>
     6803, &quot;Operational System Testing for Designed in Security.&quot
     6804Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, Tennessee, ACM, New York, NY, USA,
     68052013.
     6806doi:10.1145/2459976.2460038.
     6807</li>
     6808<br>
     6809
    67166810
    67176811
     
    71687262
    71697263<li>
     7264<b>Sevinc, Soner</b>
     7265, &quot;A Framework for Access Control and Resource Allocation for Federations (Doctoral Dissertation).&quot
     7266Princeton, NJ,
     72672016.
     7268
     7269</li>
     7270<br>
     7271
     7272
     7273
     7274<li>
    71707275<b>Shamim, Sumaira and Fei, Zongming</b>
    71717276, &quot;Evaluating a QoS aware path selection service using the GENI network.&quot
     
    74987603
    74997604<li>
     7605<b>Turi, Leo</b>
     7606, &quot;Contribution to the Federation of the asynchronous SmartSantander service layer within the European Fed4FIRE context (Master's Thesis).&quot
     7607
     76082015.
     7609
     7610</li>
     7611<br>
     7612
     7613
     7614
     7615<li>
    75007616<b>Turner, Jonathan S.</b>
    75017617, &quot;A proposed architecture for the GENI backbone platform.&quot