VCSTC: Virtual cyber security testing capability - An application oriented paradigm for network infrastructure protection

1Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Network security devices are becoming more sophisticated and so are the testing processes. Traditional network testbeds face challenges in terms of fidelity, scalability and complexity of security features. In this paper we propose a new methodology of testing security devices using network virtualization techniques, and present an integrated solution, including network emulation, test case specification and automated test execution. Our hybrid network emulation scheme provides high fidelity by host virtualization and scalability by lightweight protocol stack emulation. We also develop an intermediate level test case description language that is suitable for security tests at various network protocol layers and that can be executed automatically on the emulated network. The methodology presented in this paper has been implemented and integrated into a security infrastructure testing system for US Department of Defense and we report the experimental results. © IFIP International Federation for Information Processing 2008.

References Powered by Scopus

Principles and methods of testing finite state machines - A survey

965Citations
N/AReaders
Get full text

Discovery of policy anomalies in distributed firewalls

296Citations
N/AReaders
Get full text

The honeynet project: Trapping the hackers

263Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Cyber Range Automation Overview with a Case Study of CRATE

20Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Shu, G., Chen, D., Liu, Z., Li, N., Sang, L., & Lee, D. (2008). VCSTC: Virtual cyber security testing capability - An application oriented paradigm for network infrastructure protection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5047 LNCS, pp. 119–134). Springer Verlag. https://doi.org/10.1007/978-3-540-68524-1_10

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

100%

Readers' Discipline

Tooltip

Computer Science 8

100%

Save time finding and organizing research with Mendeley

Sign up for free