Xen and the art of virtualization
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Designing and implementing a cyberwar laboratory exercise for a computer security course
Proceedings of the 35th SIGCSE technical symposium on Computer science education
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Virtual private networks: a model for assessing alternatives
International Journal of Networking and Virtual Organisations
N2N: A Layer Two Peer-to-Peer VPN
AIMS '08 Proceedings of the 2nd international conference on Autonomous Infrastructure, Management and Security: Resilient Networks and Services
Characterizing User-Level Network Virtualization: Performance, Overheads and Limits
ESCIENCE '08 Proceedings of the 2008 Fourth IEEE International Conference on eScience
Exploring virtual environments in a decentralized lab
ACM SIGITE Research in IT
Trellis: a platform for building flexible, fast virtual networks on commodity hardware
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Enhancing realistic hands-on network training in a virtual environment
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
On the design of scalable, self-configuring virtual networks
Proceedings of the Conference on High Performance Computing Networking, Storage and Analysis
A survey of network virtualization
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Developing realistic cyber warfare training environments enables individualized hands-on training of cyber security topics without using operational networks. Cost, space, time, and reproducibility are major factors that prevent large-scale network replications for individual training purposes. Network virtualization provides an alternative training approach. Network virtualization is an important component in building a decentralized cyber warfare education platform. It allows for software defined, virtual network topologies that are independent of the underlying physical network topology. This creates an environment where students have increased flexibility over the creation and connections of their individual virtual networks. However, there is overhead associated with the virtualization of the network layer. Additional software drivers must encrypt and repackage inbound and outbound packets destined for the virtual network. This research presents a set of experiments that characterize this virtualization performance overhead relative to direct physical connections. Results indicate two to four times reduction in performance with respect to both latency and bandwidth when the network is virtualized relative to direct network connections. The benefit to this cost in performance is the ability to create scalable, flexible network topologies that can be used to create a robust, isolated cyber training environment.