Security tests and attack experimentations of ProtoGENI Online publication date: Sat, 19-Sep-2015
by Jingcheng Gao; Yang Xiao; Sneha Rao; Fnu Shalini
International Journal of Security and Networks (IJSN), Vol. 10, No. 3, 2015
Abstract: Tests and experiments to investigate selected security issues through ProtoGENI are conducted throughout this paper. The ProtoGENI is through its Spiral 1 time period, which primarily focuses on developing control and aggregating functions, up to the beginning of Spiral 4 time period now. Spiral 4 focuses on the transition from a rapid-prototyping effort to a 'real GENI' that supports network research experimentation. Owing to the lack of security related functions in the ProtoGENI's initial status, there is a necessity to explore the security vulnerabilities of ProtoGENI. Throughout the past several Spiral time periods, we designed four major sets of security tests and experiments, to examine certain types of its security vulnerabilities. All of the above tests and experiments showed that it is very possible that ProtoGENI nodes may render vulnerabilities to these attacks.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com