Changes between Version 1 and Version 2 of Quarterly-ExptsSec-report-2.txt


Ignore:
Timestamp:
04/19/10 18:36:38 (14 years ago)
Author:
hxy@cs.ua.edu
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • Quarterly-ExptsSec-report-2.txt

    v1 v2  
    44
    55'''Title:''' GENI Experiments for Traffic Capture Capabilities and Security Requirement Analysis [[BR]]
     6
    67'''Period: First quarter 2010''' [[BR]]
     8
    79'''Authors:'''  Xiaoyan Hong, Fei Hu, Yang Xiao, University of Alabama [[BR]]
    810
     
    2123The deliverables made in this period include:
    2224
    23 (1) Presentation at the GEC 7 to report our initial experiments and corresponding
    24 security vulnerabilities investigated in the experiments. 
     25(1) Presentation at the GEC7 to report our initial experiments and corresponding
     26security vulnerabilities investigated in the experiments.  [[BR]]
    2527http://groups.geni.net/geni/attachment/wiki/ExptsSecurityAnalysis/ExptsSec-gec7.pdf [[BR]]
    26  
    27 (2) Document reporting the initial experiments based on the Milestone ExptsSec: S2.a design document and the initial findings on the corresponding security vulnerabilities. http://groups.geni.net/geni/attachment/wiki/ExptsSec-initialExpts-findings.pdf [[BR]]
    2828
     29(2) Document reporting the initial experiments based on the Milestone ExptsSec: S2.a design document and the initial findings on the corresponding security vulnerabilities. [[BR]]
     30http://groups.geni.net/geni/attachment/wiki/ExptsSec-initialExpts-findings.pdf [[BR]]
    2931
    30 (3) Revised experimentation plans based on interaction with Rob and Vic in February. http://groups.geni.net/geni/attachment/wiki/ExptsSec-designdoc-revised.pdf [[BR]]
     32(3) Revised experimentation plans based on interaction with Rob and Vic in February. [[BR]]http://groups.geni.net/geni/attachment/wiki/ExptsSec-designdoc-revised.pdf [[BR]]
    3133
    3234
     
    3537=== A. Activities and findings ===
    3638
    37 We have run several experiments designed in Milestone 1. We tried to install our own virtual machine to testing security breaches. We also analyzed some of the test scripts for potential experiments. We have used the geni-user mailing-list to interact with ProtoGENI technical personals to solve several problems in our experiments. The results and findings are reported in GEC#7 presentation and in a separate document. ExptsSec-initialExpts-findings.pdf [[BR]]
     39We have run several experiments designed in Milestone 1. We tried to install our own virtual machine to testing security breaches. We also analyzed some of the test scripts for potential experiments. We have used the geni-user mailing-list to interact with ProtoGENI technical personals to solve several problems in our experiments. The results and findings are reported in GEC7 presentation and in a separate document. ExptsSec-initialExpts-findings.pdf [[BR]]
    3840
    3941
     
    4446
    4547
    46 PI Xiaoyan Hong and a graduate student Dawei Li attended GEC #7 in March 2010, at Duke University, NC. We applied and obtained a travel grant for Dawei Li to go to GEC#7. [[BR]]
     48PI Xiaoyan Hong and a graduate student Dawei Li attended GEC7 in March 2010, at Duke University, NC. We applied and obtained a travel grant for Dawei Li to go to GEC7. [[BR]]
    4749
    4850