Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
___________________________________________ * Copyright © 2008 by the Consortium for Computing Sciences in Colleges. Permission to copy without fee all or part of this material is granted provided that the copies are not made or distributed for direct commercial advantage, the CCSC copyright notice and the title of the publication and its date appear, and notice is given that copying is by permission of the Consortium for Computing Sciences in Colleges. To copy otherwise, or to republish, requires a fee and/or specific permission. 73 BUILDING A NETWORK TESTBED FOR INTERNET SECURITY RESEARCH * Chris Heien 1 , Rick Massengale 1 , Ningning Wu 2 1 Applied Science Department 2 Information Science Department University of Arkansas at Little Rock ABSTRACT Historical research of intrusion, anomaly, or rogue software detection, and network protection techniques to prevent Denial of Service, or other malicious software attacks, have involved antiquated singularly scoped techniques. Malicious software attacks, whether in the form of worms, spyware, malware, or computer viruses, have economically and productively impacted the state of information exchange throughout the interconnected world. The ability to proactively identify the threats or unauthorized activity that contradicts day-to- day activities, will allow initiation of defenses before a full threat infestation occurs. This paper describes a test networked system that has been built for our research projects involving Internet worm detection. The goal of the system is to simulate a global network containing heterogeneous systems; in turn, we may study the behaviors of various worms and to design effective strategies for predicting, detecting, and quarantining outbreaks. INTRODUCTION The mere utterance of Jerusalem, Michelangelo, Melissa, Sobig, Code Red or the economically devastating Loveletter will bring the most hardened networking conversations to a stop to hear what is stated. These devastating and destructive network forces rage through global networks affecting businesses, residences, and impeding the daily activities of all networked technology. Technologies that would decisively prevent the onset of these attacks have not yet been developed, nor has the activity of these destructive occurrences been exposed unless they first impede the “normal” operation of
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
JCSC 23, 4 (April 2008) 1 Known as “back-porting” and used to describe dated software versions being ported to newer platforms. 2 These processors consist of Intel's Pentium D and Core Duo line of x86/EMT64 processors containing the 'VT' CPU instruction set. These instructions are included on AMD's Athlon64 and Turion64 processors based on the Socket AM2 and Socket S1 respectively. 74
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/05/2009 for the course IT IS taught by Professor Arther during the Three '09 term at Queensland Tech.

Page1 / 7


This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online