Security Issues in ProtoGENI
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2016, Vol 3, Issue 6
Abstract
Network security consists of primary concerns in future Internet development due to the ever increasing threats to current Internet. ProtoGENI is a federated testbed facility supporting slice-based experiments to manage, utilize, and monitor the resources for innovative network research. Security research in ProtoGENI is crucial because experiments conducted in manipulated or corruptted test environment can mislead about security mechanism’s capabilities in a system. In this paper, existing ProtoGENI security mechanisms and functions are tested and analyzed through different experiments to find out the exploitable attacking loopholes. Experiments elaborate the existing functioning and security issues that can cause nonfunctional, semi non-functional or malfunctioned systems. Results indicate threats to ProtoGENI resources and run-time interactions. Cross-experiment communication in Emulab wireless nodes have the capability of assisting in verifying isolation between ProtoGENI slices. Host security is one of the security components, which can be enhanced by modifying default security settings including SSH port number and root login rights. Documentation of experiment environment, experiment design, results, and analysis including many observations is helpful to understand the basic functioning and security issues to improve the overall functioning and security of ProtoGENI.
Authors and Affiliations
Fnu Shalini, Yang Xiao, Bo Sun
Map Matching Algorithm: Trajectory and Sequential Map Analysis on Road Network
The Global Positioning System (GPS) tracking data is essential for sensor data sources. It plays an important role for various systems like Traffic assessment and Prediction, routing and navigation, Fleet management etc. T...
How to Make Business Processes “Socialize”?
This paper presents an approach that builds upon social computing principles to make business processes “socialize”. First the approach identifies the main components of a business process that are task, person, and mach...
On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case
One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate...
Split and Merge Strategies for Solving Uncertain Equations Using Affine Arithmetic
The behaviour of systems is determined by various parameters. Due to several reasons like e. g. manufacturing tolerances these parameters can have some uncertainties. Corner Case and Monte Carlo simulations are well know...
Centrality-Based Paper Citation Recommender System
Researchers cite papers in order to connect the new research ideas with previous research. For the purpose of finding suitable papers to cite, researchers spend a considerable amount of time and effort. To help researche...