3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)

Research Article

Large-scale Reconfigurable Virtual Testbed for Information Security Experiments

  • @INPROCEEDINGS{10.1109/TRIDENTCOM.2007.4444663,
        author={Alexander Volynkin and Victor Skormin},
        title={Large-scale Reconfigurable Virtual Testbed for Information Security Experiments},
        proceedings={3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom)},
        publisher={IEEE},
        proceedings_a={TRIDENTCOM},
        year={2008},
        month={2},
        keywords={},
        doi={10.1109/TRIDENTCOM.2007.4444663}
    }
    
  • Alexander Volynkin
    Victor Skormin
    Year: 2008
    Large-scale Reconfigurable Virtual Testbed for Information Security Experiments
    TRIDENTCOM
    IEEE
    DOI: 10.1109/TRIDENTCOM.2007.4444663
Alexander Volynkin1,*, Victor Skormin1,*
  • 1: Dept. of Electrical and Computer Engineering/Center for Advanced Information Technologies, Binghamton University, Binghamton NY, USA
*Contact email: alex@volynkin.com, vskormin@binghamton.edu

Abstract

The vulnerability of a modern computer network to information attacks stems from its high complexity, global interconnectivity and multiple entry points. While experimental security-related studies cannot be performed on “real” operating computer networks, and data collected during real information attacks is incomplete and sporadic, extensive network facilities have become a necessary component of security research. In order to assure the scalability of results, it is important that the experimental network properly emulates the “real” network. The development of such an experimental facility for network security research is presented. It will allow for a high level of software virtualization enabling the users to achieve a high level of network scalability and rapid deployment, ensuring proper analysis and development of new tools and techniques for threat detection and mitigation.