Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks
OpenFlow: enabling innovation in campus networks
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
To design secure systems, one needs to understand how attackers use system vulnerabilities in their favor. This requires testing vulnerabilities on operational systems. However, working on operational systems is not always possible because of the risk of disturbance. In this study, we introduce an approach to experimenting using operational system data and performing real attacks without disturbing the original system. We applied this approach to a network security experiment and tested the performance of three detection methods. The approach used in this study can be used when developing systems with Designed-in Security to identify and test system vulnerabilities.