2013
DOI: 10.1007/978-3-642-40597-6_5
|View full text |Cite
|
Sign up to set email alerts
|

A Virtualized Network Testbed for Zero-Day Worm Analysis and Countermeasure Testing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
4
0
Order By: Relevance
“…Virtualisation systems provide speed performance which is better than emulation systems because the guest hosts can directly access the physical host hardware [13]. Some existing virtualised testbeds include V-NetLab [14], ViSe [15], vGround [16] and VMT [17]. V-NetLab utilizes network virtualisation at the data-link layer in order to allow for the re-use of the same set of IP addresses in different virtual networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Virtualisation systems provide speed performance which is better than emulation systems because the guest hosts can directly access the physical host hardware [13]. Some existing virtualised testbeds include V-NetLab [14], ViSe [15], vGround [16] and VMT [17]. V-NetLab utilizes network virtualisation at the data-link layer in order to allow for the re-use of the same set of IP addresses in different virtual networks.…”
Section: Related Workmentioning
confidence: 99%
“…This enables the development of multiple sessions of different worm experiments quickly, contrary to VMT [17] that used a substantially manual method.…”
Section: V-network a Designmentioning
confidence: 99%
“…But, as far as the authors of this paper are aware, no previous published work except [2] (which reports Slammer worm outbreak), has presented an infection and propagation analysis of any fast random scanning worm, Hit-list or Flash worm in a real isolated network with real worm outbreak conditions; which forms basis of this research work.…”
Section: A Empicircal Analysis Of Zero-day Wormsmentioning
confidence: 99%
“…The key characteristics possessed by worms are; a rapid rate of propagation, ability to self-replicate and increased sophistication of worm's code, which have made them highly infectious and capable of causing a denial of service attack on the internet as in the case of SQL Slammer outbreak. The SQL Slammer worm is considered to be the fastest randomscanning worm in the history as it has achieved its full aggregate scanning rate, of over 55 million scans per seconds, only after 3 minutes of its release [1], while infecting 90% of susceptible machines within 10 minutes [1,2]. Although, it did not contain any malicious payload, the traffic it has generated created halted parts of internet by causing a denialof-service attack.…”
Section: Introductionmentioning
confidence: 99%