Evaluation Methods for Internet Security Technology (EMIST)

 Publications           

 

    

R. Chertov, S. Fahmy, and N. B. Shroff, Emulation versus Simulation: A Case Study of TCP-Targeted Denial of Service Attacks, In Proceedings of 2nd International IEEE/CreateNet Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom), March 2006.

 

L. Li, I. Hamadeh, S. Jiwasurat, G. Kesidis, P. Liu, C. Neuman, “Emulating Sequential Scanning Worms on the DETER Testbed, In Proceedings of 2nd International IEEE/CreateNet Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom), March 2006.

 

S. Sellke, N. B. Shroff, and S. Bagchi, Modeling and Automated Containment of Worms, In Proceedings of the International Conference on Dependable Systems and Networks (DSN), Yokohama, Japan, June 28-July 1, 2005.

L. Li, S. Jiwasurat, P. Liu, G. Kesidis, “Emulation of Single Packet UDP Scanning Worms in Large Enterprises”, In Proc. 19  International Teletraffic Congress (ITC19), August 2005.

 

G. Kesidis, I. Hamadeh and S. Jiwasurat, “Modeling randomly scanning and bandwidth-saturating Internet worms”, in Proc. 3rd QoS-IP, Catania, Sicily, Feb. 2005.

 

N. Weaver, S. Staniford and V. Paxson, Very fast containment of scanning worms, in Proc.  USENIX Security, San Diego, Aug. 2004.

 

J. Just, G. Kesidis, K. Levitt, J. Rowe, F. Wu, P. Porras, “Lack of science for testing the effectiveness of large-scale cyber defenses”, in Proc.  NSPW, Nova Scotia, Sept. 2004.

 

N. Weaver, I. Hamadeh, G. Kesidis and V. Paxson, “Preliminary results using scale-down to explore worm dynamics”, in Proc.  ACM WORM, Washington, DC, Oct. 29, 2004.

 

P. Porras, L. Biesemeister, K. Levitt, J. Rowe, K. Skinner, A. Ting, “A hybrid quarantine defense”, in Proc. ACM WORM, Washington, DC, Oct. 29, 2004.

 

S.T. Teoh, K. Zhang, S.-M. Tseng, K.-L. Ma and S. F. Wu, “Combining visual and automated data mining for near-real-time anomaly detection and analysis in BGP”, in Proc. ACM VizSEC/CMSEC-04, Washington, DC, Oct. 29, 2004.

 

EMIST web page

 

DETER web page