Changes between Version 1 and Version 2 of Quarterly-ExptsSec-report-2.txt
- Timestamp:
- 04/19/10 18:36:38 (13 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Quarterly-ExptsSec-report-2.txt
v1 v2 4 4 5 5 '''Title:''' GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis [[BR]] 6 6 7 '''Period: First quarter 2010''' [[BR]] 8 7 9 '''Authors:''' Xiaoyan Hong, Fei Hu, Yang Xiao, University of Alabama [[BR]] 8 10 … … 21 23 The deliverables made in this period include: 22 24 23 (1) Presentation at the GEC 24 security vulnerabilities investigated in the experiments. 25 (1) Presentation at the GEC7 to report our initial experiments and corresponding 26 security vulnerabilities investigated in the experiments. [[BR]] 25 27 http://groups.geni.net/geni/attachment/wiki/ExptsSecurityAnalysis/ExptsSec-gec7.pdf [[BR]] 26 27 (2) Document reporting the initial experiments based on the Milestone ExptsSec: S2.a design document and the initial findings on the corresponding security vulnerabilities. http://groups.geni.net/geni/attachment/wiki/ExptsSec-initialExpts-findings.pdf [[BR]]28 28 29 (2) Document reporting the initial experiments based on the Milestone ExptsSec: S2.a design document and the initial findings on the corresponding security vulnerabilities. [[BR]] 30 http://groups.geni.net/geni/attachment/wiki/ExptsSec-initialExpts-findings.pdf [[BR]] 29 31 30 (3) Revised experimentation plans based on interaction with Rob and Vic in February. http://groups.geni.net/geni/attachment/wiki/ExptsSec-designdoc-revised.pdf [[BR]]32 (3) Revised experimentation plans based on interaction with Rob and Vic in February. [[BR]]http://groups.geni.net/geni/attachment/wiki/ExptsSec-designdoc-revised.pdf [[BR]] 31 33 32 34 … … 35 37 === A. Activities and findings === 36 38 37 We have run several experiments designed in Milestone 1. We tried to install our own virtual machine to testing security breaches. We also analyzed some of the test scripts for potential experiments. We have used the geni-user mailing-list to interact with ProtoGENI technical personals to solve several problems in our experiments. The results and findings are reported in GEC #7 presentation and in a separate document. ExptsSec-initialExpts-findings.pdf [[BR]]39 We have run several experiments designed in Milestone 1. We tried to install our own virtual machine to testing security breaches. We also analyzed some of the test scripts for potential experiments. We have used the geni-user mailing-list to interact with ProtoGENI technical personals to solve several problems in our experiments. The results and findings are reported in GEC7 presentation and in a separate document. ExptsSec-initialExpts-findings.pdf [[BR]] 38 40 39 41 … … 44 46 45 47 46 PI Xiaoyan Hong and a graduate student Dawei Li attended GEC #7 in March 2010, at Duke University, NC. We applied and obtained a travel grant for Dawei Li to go to GEC#7. [[BR]]48 PI Xiaoyan Hong and a graduate student Dawei Li attended GEC7 in March 2010, at Duke University, NC. We applied and obtained a travel grant for Dawei Li to go to GEC7. [[BR]] 47 49 48 50