|
Evaluation Methodologies for Internet Security Technology
|
|
Selected Publications
- Wei-Min Yao, Sonia Fahmy, "Partitioning Network Testbed Experiments,"
In Proceedings of IEEE
International Conference on Distributed Computing Systems (ICDCS),
11 pp., June 2011. [PDF]
- Partitioning network experiments for the cyber-range, poster, CERIAS symposium, April 2011.
- J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher, R. K. Thomas,
"Accurately measuring denial of service in simulation and testbed
experiments," IEEE Transactions on Dependable and Secure Computing
(TDSC), volume 6, issue 2, pp. 81-95, Apr/June 2009. [PDF]
- J. Mirkovic, S. Fahmy, P. Reiher, R. K. Thomas, "How to test
DoS defenses," In Proceedings of the Cybersecurity Applications and
Technologies Conference for Homeland Security (CATCH), 15 pp.,
March 2009.
[PDF]
- Roman Chertov, Sonia Fahmy, and Ness B. Shroff, "Fidelity of
Network Simulation and Emulation: A Case Study of TCP-Targeted Denial
of Service Attacks," ACM Transactions on Modeling and Computer
Simulation (TOMACS), volume 19, issue 1, pp. 4:1-4:29, December 2008. [PDF]
- Roman Chertov, Sonia Fahmy, Ness B. Shroff, "A
Device-Independent Router Model," In Proceedings of IEEE INFOCOM (the
conference on computer communications), 9 pp., April 2008.
[PDF]
- Wei-Min Yao, Sonia Fahmy, "Downscaling Network Scenarios with
Denial of Service (DoS) Attacks," In Proceedings of the IEEE Sarnoff
Symposium (Invited Session on Security), 6 pages, April 2008.
[PDF]
- J. Mirkovic, B. Wilson, A. Hussain, S. Fahmy, P. Reiher, R. Thomas,
S. Schwab, "Automating DoS Experimentation," In Proceedings
of the DETER Community Workshop on Cyber Security Experimentation and
Test, held in conjunction with USENIX Security, 8 pp., August 2007.
[PDF]
- J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher,
R. Thomas, W. Yao, S. Schwab, "Towards User-Centric Metrics for Denial of
Service Measurement," In Proceedings of the Workshop on Experimental
Computer Science (part of ACM FCRC), 14 pp., June 2007.
[PDF] [Related SIGMETRICS 2007 extended abstract]
- Roman Chertov, Sonia Fahmy, Ness B. Shroff, "A Black-box Router
Profiler," In Proceedings of the IEEE Global Internet Symposium, 6
pp., May 2007. [PDF]
[Correction to Related Work section]
- J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas,
S. Schwab, S. Fahmy, R. Chertov, P. Reiher, "DDoS Benchmarks and
Experimenter's Workbench for the DETER Testbed," In Proceedings
of 3rd International IEEE/CreateNet Conference on Testbeds and
Research Infrastructures for the Development of Networks and
Communities (TridentCom), 7 pp., May 2007. [PDF]
- High-fidelity DoS Simulation and Emulation Experiments, poster, CERIAS symposium, March 2007.
- Jelena Mirkovic, Peter Reiher, Sonia Fahmy, Roshan Thomas,
Alefiya Hussain, Steven Schwab, Calvin Ko, "Measuring Denial of
Service," In Proceedings of the second workshop on Quality of
Protection (QoP), in conjunction with ACM CCS, pp. 53-58, October 2006.
[PDF]
-
R. Chertov, S. Fahmy, N. B. Shroff,
"Emulation
versus Simulation: A Case Study of TCP-Targeted Denial of Service
Attacks," In Proceedings of 2nd International IEEE/CreateNet
Conference on Testbeds and Research Infrastructures for the
Development of Networks and Communities (TridentCom), March 2006.
[PDF]
- R. Chertov, S. Fahmy, N. B. Shroff,
"High Fidelity Denial of Service (DoS) Experimentation,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- R. Chertov, S. Fahmy, P. Kumar, D. Bettis,
A. Khreishah, N. B. Shroff,
"Topology Generation, Instrumentation, and Experimental Control
Tools for Emulation Testbeds,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- A. Hussain, S. Schwab, R. Thomas, S. Fahmy, J. Mirkovic,
"DDoS Experiment Methodology,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- J. Mirkovic, S. Fahmy, P. Reiher, R. Thomas, A. Hussain,
S. Schwab, C. Ko,
"Measuring Impact of DoS Attacks,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- J. Mirkovic, E. Arikan, S. Wei, S. Fahmy, R. Thomas, P. Reiher,
"Benchmarks for DDoS Defense Evaluation,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- Emulation vs. Simulation: A Case Study with DoS Attacks, and Experiment Automation and Topology Generation Tools for the DETER Testbed,
posters, CyberTrust PI meeting, September 2005.
-
S. Sellke, N. B. Shroff, S. Bagchi, "Modeling and Automated
Containment of Worms," In Proceedings of the International Conference on
Dependable Systems and Networks (DSN), Yokohama, Japan, June 28-July
1, 2005.
[PDF]
- Evaluation Methodologies for Internet Security
Technologies, poster, CERIAS symposium, March 2005.
-
R. Bajcsy et al. (24 authors), "Cyber Defense Technology
Networking and Evaluation," Communications of the ACM, volume 47,
issue 3, pp. 58-61, March 2004.
[PDF]
- Evaluation Methods for Internet Security
Technologies, poster, CERIAS symposium, March 2004.
Presentations and Demos
This project is being funded by the National Science Foundation (NSF) grant
CNS-0831353 and Northrop Grumman Corp.
Earlier work was funded by NSF grant CNS-0523249, NSF/Department of Homeland Security (DHS) grant CNS-0335247 and a subcontract from the University of Delaware (from a DHS grant).
Last updated by: Sonia Fahmy
March 2011