Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security

20Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Rigorous scientific experimentation in system and network security remains an elusive goal. Recent work has outlined three basic requirements for experiments, namely that hypotheses must be falsifiable, experiments must be controllable, and experiments must be repeatable and reproducible. Despite their simplicity, these goals are difficult to achieve, especially when dealing with client-side threats and defenses, where often user input is required as part of the experiment. In this paper, we present techniques for making experiments involving security and client-side desktop applications like web browsers, PDF readers, or host-based firewalls or intrusion detection systems more controllable and more easily repeatable. First, we present techniques for using statistical models of user behavior to drive real, binary, GUI-enabled application programs in place of a human user. Second, we present techniques based on adaptive replay of application dialog that allow us to quickly and efficiently reproduce reasonable mock-ups of remotely-hosted applications to give the illusion of Internet connectedness on an isolated testbed. We demonstrate the utility of these techniques in an example experiment comparing the system resource consumption of a Windows machine running anti-virus protection versus an unprotected system. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Wright, C. V., Connelly, C., Braje, T., Rabek, J. C., Rossey, L. M., & Cunningham, R. K. (2010). Generating client workloads and high-fidelity network traffic for controllable, repeatable experiments in computer security. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6307 LNCS, pp. 218–237). Springer Verlag. https://doi.org/10.1007/978-3-642-15512-3_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free