Proceedings of the 20th International Conference on Distributed Computing and Networking 2019
DOI: 10.1145/3288599.3288618
|View full text |Cite
|
Sign up to set email alerts
|

Building an emulation environment for cyber security analyses of complex networked systems

Abstract: Computer networks are undergoing a phenomenal growth, driven by the rapidly increasing number of nodes constituting the networks. At the same time, the number of security threats on Internet and intranet networks is constantly growing, and the testing and experimentation of cyber defense solutions requires the availability of separate, test environments that best emulate the complexity of a real system. Such environments support the deployment and monitoring of complex mission-driven network scenarios, thus en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…Network scanning, checking for availability and installing the latest updates, monitoring the use of USB devices, remote access, and verification of compliance with the password management policy are all services offered by Languard [19,20], which are like Nessus. The program can be used for no more than two computers for free.…”
Section: System Administration Strategy For Securitymentioning
confidence: 99%
“…Network scanning, checking for availability and installing the latest updates, monitoring the use of USB devices, remote access, and verification of compliance with the password management policy are all services offered by Languard [19,20], which are like Nessus. The program can be used for no more than two computers for free.…”
Section: System Administration Strategy For Securitymentioning
confidence: 99%