|
Network Experimentation
|
|
Selected Publications (and Slides)
- Samuel Jero, Xiangyu Bu, Cristina Nita-Rotaru, Hamed Okhravi,
Richard Skowyra, Sonia Fahmy, "BEADS: A Framework for Attack
Discovery in OpenFlow-based SDN Systems,"
In Proceedings of the 20th International Symposium on Research in
Attacks, Intrusions and Defenses (RAID 2017), 22 pp., September 2017.
[PDF]
- Amit Sheoran, Puneet Sharma, Sonia Fahmy, Vinay Saxena,
"Contain-ed: An NFV Micro-Service System for Containing e2e Latency,"
In Proceedings of ACM SIGCOMM 2017 1st International Workshop on Hot Topics in Container Networking and Networked Systems (HotConNet), 6 pp., August 2017.
[PDF]
Best paper award
Extended version appeared in
ACM SIGCOMM Computer Communications Review (CCR), 47(5), 7 pp.,
October 2017.
[PDF]
- Lianjie Cao, Xiangyu Bu, Sonia Fahmy, Siyuan Cao,
"Towards High Fidelity Network Emulation,"
In Proceedings of IEEE
International Conference on Computer Communications and Networks
(ICCCN), 11 pp., July 2017 (Invited paper).
[PDF]
[Slides PDF]
- Lianjie Cao, Puneet Sharma, Sonia Fahmy, Vinay Saxena,
"ENVI: Elastic resource flexing for Network function
VIrtualization," In Proceedings of the
9th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud '17),
8 pp., July 2017. [Paper PDF]
[Slides PDF]
- Amit Sheoran, Xiangyu Bu, Lianjie Cao, Puneet Sharma, Sonia
Fahmy, "An Empirical Case for Container-driven
Fine-grained VNF Resource Flexing,"
In Proceedings of IEEE NFV-SDN, 7 pp., November 2016.
[PDF]
Runner-up for best paper award
- Lianjie Cao, Puneet Sharma, Sonia Fahmy, Vinay Saxena,
"NFV-VITAL: A Framework for Characterizing the Performance of Virtual
Network Functions,"
In Proceedings of IEEE NFV-SDN, 7 pp., November 2015. [PDF]
Best paper award
- Wei-Min Yao, Sonia Fahmy, "Flow-based Partitioning of Network Testbed
Experiments," Computer Networks, Volume 58, 15 January 2014, Pages 141-157. [PDF]
[From ScienceDirect]
- Wei-Min Yao, Sonia Fahmy, Jiahong Zhu,
"EasyScale: Easy Mapping for Large-Scale Network Security Experiments,"
In Proceedings of the first IEEE Conference on Communications and
Network Security (CNS), 9 pp., October 2013. [PDF]
- Wei-Min Yao, Sonia Fahmy, "Partitioning Network Testbed Experiments," In Proceedings of IEEE
International Conference on Distributed Computing Systems (ICDCS),
11 pp., June 2011. [PDF]
- Partitioning network experiments for the cyber-range, poster, CERIAS symposium, April 2011.
- Roman Chertov and Sonia Fahmy, "Forwarding Devices: From
Measurements to Simulations," ACM Transactions on Modeling and
Computer Simulation (TOMACS), 21(2), pp. 12:1-12:23 (plus online appendix), February 2011.
[PDF]
- J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher, R. K. Thomas,
"Accurately measuring denial of service in simulation and testbed
experiments," IEEE Transactions on Dependable and Secure Computing
(TDSC), volume 6, issue 2, pp. 81-95, Apr/June 2009. [PDF]
- J. Mirkovic, S. Fahmy, P. Reiher, R. K. Thomas, "How to test
DoS defenses," In Proceedings of the Cybersecurity Applications and
Technologies Conference for Homeland Security (CATCH), 15 pp.,
March 2009.
[PDF]
- Roman Chertov, Sonia Fahmy, and Ness B. Shroff, "Fidelity of
Network Simulation and Emulation: A Case Study of TCP-Targeted Denial
of Service Attacks," ACM Transactions on Modeling and Computer
Simulation (TOMACS), volume 19, issue 1, pp. 4:1-4:29, December 2008. [PDF]
- Roman Chertov, Sonia Fahmy, Ness B. Shroff, "A
Device-Independent Router Model," In Proceedings of IEEE INFOCOM (the
conference on computer communications), 9 pp., April 2008.
[PDF]
- Wei-Min Yao, Sonia Fahmy, "Downscaling Network Scenarios with
Denial of Service (DoS) Attacks," In Proceedings of the IEEE Sarnoff
Symposium (Invited Session on Security), 6 pages, April 2008.
[PDF]
- J. Mirkovic, B. Wilson, A. Hussain, S. Fahmy, P. Reiher, R. Thomas,
S. Schwab, "Automating DoS Experimentation," In Proceedings
of the DETER Community Workshop on Cyber Security Experimentation and
Test, held in conjunction with USENIX Security, 8 pp., August 2007.
[PDF]
- J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher,
R. Thomas, W. Yao, S. Schwab, "Towards User-Centric Metrics for Denial of
Service Measurement," In Proceedings of the Workshop on Experimental
Computer Science (part of ACM FCRC), 14 pp., June 2007.
[PDF] [Related SIGMETRICS 2007 extended abstract]
- Roman Chertov, Sonia Fahmy, Ness B. Shroff, "A Black-box Router
Profiler," In Proceedings of the IEEE Global Internet Symposium, 6
pp., May 2007. [PDF]
[Correction to Related Work section]
- J. Mirkovic, S. Wei, A. Hussain, B. Wilson, R. Thomas,
S. Schwab, S. Fahmy, R. Chertov, P. Reiher, "DDoS Benchmarks and
Experimenter's Workbench for the DETER Testbed," In Proceedings
of 3rd International IEEE/CreateNet Conference on Testbeds and
Research Infrastructures for the Development of Networks and
Communities (TridentCom), 7 pp., May 2007. [PDF]
- High-fidelity DoS Simulation and Emulation Experiments, poster, CERIAS symposium, March 2007.
- Jelena Mirkovic, Peter Reiher, Sonia Fahmy, Roshan Thomas,
Alefiya Hussain, Steven Schwab, Calvin Ko, "Measuring Denial of
Service," In Proceedings of the second workshop on Quality of
Protection (QoP), in conjunction with ACM CCS, pp. 53-58, October 2006.
[PDF]
-
R. Chertov, S. Fahmy, N. B. Shroff,
"Emulation
versus Simulation: A Case Study of TCP-Targeted Denial of Service
Attacks," In Proceedings of 2nd International IEEE/CreateNet
Conference on Testbeds and Research Infrastructures for the
Development of Networks and Communities (TridentCom), March 2006.
[PDF]
- R. Chertov, S. Fahmy, N. B. Shroff,
"High Fidelity Denial of Service (DoS) Experimentation,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- R. Chertov, S. Fahmy, P. Kumar, D. Bettis,
A. Khreishah, N. B. Shroff,
"Topology Generation, Instrumentation, and Experimental Control
Tools for Emulation Testbeds,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- A. Hussain, S. Schwab, R. Thomas, S. Fahmy, J. Mirkovic,
"DDoS Experiment Methodology,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- J. Mirkovic, S. Fahmy, P. Reiher, R. Thomas, A. Hussain,
S. Schwab, C. Ko,
"Measuring Impact of DoS Attacks,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- J. Mirkovic, E. Arikan, S. Wei, S. Fahmy, R. Thomas, P. Reiher,
"Benchmarks for DDoS Defense Evaluation,"
In Proceedings of the DETER Community Workshop on
Cyber Security Experimentation, June 2006.
[PDF]
- Emulation vs. Simulation: A Case Study with DoS Attacks, and Experiment Automation and Topology Generation Tools for the DETER Testbed,
posters, CyberTrust PI meeting, September 2005.
-
S. Sellke, N. B. Shroff, S. Bagchi, "Modeling and Automated
Containment of Worms," In Proceedings of the International Conference on
Dependable Systems and Networks (DSN), Yokohama, Japan, June 28-July
1, 2005.
[PDF]
- Evaluation Methodologies for Internet Security
Technologies, poster, CERIAS symposium, March 2005.
-
R. Bajcsy et al. (24 authors), "Cyber Defense Technology
Networking and Evaluation," Communications of the ACM, volume 47,
issue 3, pp. 58-61, March 2004.
[PDF]
- Evaluation Methods for Internet Security
Technologies, poster, CERIAS symposium, March 2004.
Selected Software Tools
Selected Demos
This project was funded by the National Science Foundation (NSF) grant CNS-1319924.
Earlier results were funded by NSF grant CNS-0831353, Northrop Grumman Corp.,
NSF grant CNS-0523249, NSF/Department of Homeland Security (DHS) grant CNS-0335247 and a subcontract from the University of Delaware (from a DHS grant).
Last updated by: Sonia Fahmy
October 2017