Designing for designers: an analysis of design practice in the real world
CHI '87 Proceedings of the SIGCHI/GI Conference on Human Factors in Computing Systems and Graphics Interface
A tree-based algorithm for distributed mutual exclusion
ACM Transactions on Computer Systems (TOCS)
Korat: automated testing based on Java predicates
ISSTA '02 Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis
SETI@home: an experiment in public-resource computing
Communications of the ACM
Automated Software Engineering
Efficient Generation of Shared RSA Keys (Extended Abstract)
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Runtime verification of .NET contracts
Journal of Systems and Software - Special issue on: Component-based software engineering
Cyber defense technology networking and evaluation
Communications of the ACM - Homeland security
Dynamic Control of Worm Propagation
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
MASCOTS '04 Proceedings of the The IEEE Computer Society's 12th Annual International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
In VINI veritas: realistic and controlled network experimentation
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Operating system support for planetary-scale network services
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Fast Worm Containment Using Feedback Control
IEEE Transactions on Dependable and Secure Computing
An architecture for network security using feedback control
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |
The testing of network-based solutions demands a series of tedious tasks such as the deployment of the solution at different nodes and the configuration of different topologies. The manual execution of these tasks is very time consuming and a configurable environment to facilitate these tasks and consequently improve testing performance is desired. In this paper a virtual network environment that can be easily re-configured is presented to address this problem. The environment has been evaluated by a series of case studies: one dealing with the deployment and containment of a worm propagation attack and one dealing with detecting a denial of service attack. Three smaller case studies have also been developed. The results are a clear indication of the flexibility and usefulness of the virtual network environment.