A plan for malware containment in the DETER testbed

  • Authors:
  • Ron Ostrenga;Stephen Schwab;Robert Braden

  • Affiliations:
  • SPARTA, Inc.;SPARTA, Inc.;USC Information Sciences Institute

  • Venue:
  • DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The DETER testbed provides a shared Internet-accessible environment where security researchers can safely run experiments and companies can test their security products. Experimentation with malware in DETER has so far been limited to simulated worms, which only simulate the spreading action without actually infecting any computer systems. This paper outlines a set of architectural and procedural changes that should allow safe experimentation with a class of moderately risky, real malware in the DETER testbed.