Challenges of Fiction in Network Security – Perspective of Virtualized Environments
The paper aims to start a discussion about challenges and possible caveats of performing network security experiments with high traffic volumes in virtual environment. A new framework for rapid evolution of denial-of-service attacks by genetic algorithms is presented. Issues with virtual environment that were encountered during initial work with the framework are listed.
KeywordsVirtualization Framework Genetic algorithm Denial of service attack
Authors would like to express gratitude to the members of Centre for Research on Cryptography and Security of Masaryk University for their valuable ideas and feedback. Special thanks go to Andriy Stetsko, Zdenek Riha and Marek Sys. Petr Svenda and Vashek Matyas were supported by the Czech Science Foundation project GBP202/12/G061.
- 1.Chertov, R., Fahmy, S., Shroff, N.B.: Emulation versus simulation: a case study of TCP-targeted denial of service attacks. In: Testbeds and Research Infrastructures for the Development of Networks and Communities. TRIDENTCOM 2006, p. 10. IEEE (2006)Google Scholar
- 2.Mirkovic, J., Benzel, T., Faber, T., Braden, R., Wroclawski, J., Schwab, S.: The DETER project: advancing the science of cyber security experimentation and test. In: Proceedings of IEEE International Conference Technology HST, p. 17. IEEE, November 2010Google Scholar
- 4.Eddington, M.: Peach fuzzing platform (2011). 30/11/2014. http://peachfuzzer.com