Security tests and attack experimentations of ProtoGENI
by Jingcheng Gao; Yang Xiao; Sneha Rao; Fnu Shalini
International Journal of Security and Networks (IJSN), Vol. 10, No. 3, 2015

Abstract: Tests and experiments to investigate selected security issues through ProtoGENI are conducted throughout this paper. The ProtoGENI is through its Spiral 1 time period, which primarily focuses on developing control and aggregating functions, up to the beginning of Spiral 4 time period now. Spiral 4 focuses on the transition from a rapid-prototyping effort to a 'real GENI' that supports network research experimentation. Owing to the lack of security related functions in the ProtoGENI's initial status, there is a necessity to explore the security vulnerabilities of ProtoGENI. Throughout the past several Spiral time periods, we designed four major sets of security tests and experiments, to examine certain types of its security vulnerabilities. All of the above tests and experiments showed that it is very possible that ProtoGENI nodes may render vulnerabilities to these attacks.

Online publication date: Sat, 19-Sep-2015

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

 
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?


Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email subs@inderscience.com