Performance, Computing, and Communications Conference, 2002. 21st IEEE International (2006)
Phoenix, AZ, USA
Apr. 10, 2006 to Apr. 12, 2006
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/.2006.1629453
S.G. Cheetancheri , Dept. of Comput. Sci., California Univ., Davis, CA, USA
D.L. Ma , Dept. of Comput. Sci., California Univ., Davis, CA, USA
K.N. Levitt , Dept. of Comput. Sci., California Univ., Davis, CA, USA
Computer worms are a serious problem. Much research has been done to detect and contain worms. One major deficiency in most research is that the claims are supported by theoretic models or simulations only and not by realistic tests. Network testbeds such as emulab and deter can be used to conduct worm experiments on networks of a few hundreds nodes. However, setting up such an experiment is not trivial. In this paper, we describe a wrapper around emulab to deploy such experiments quickly. We also demonstrate its use by evaluating an example worm containment strategy.
worm containment strategy, computer worm-defense evaluation, network testbeds, EMULAB, DETER
D. Ma, K. Levitt, T. Heberlein and S. Cheetancheri, "Towards a framework for worm-defense evaluation," Performance, Computing, and Communications Conference, 2002. 21st IEEE International(PCC), Phoenix, AZ, USA, 2006, pp. 75.