geni as an infrastructure to study malicious overlay
play

GENI as an Infrastructure to Study Malicious Overlay Networks Wenke - PowerPoint PPT Presentation

GENI as an Infrastructure to Study Malicious Overlay Networks Wenke Lee Georgia Ins=tute of Technology Goals Use GENI as a largescale distributed testbed for security research The best we can get if we cant experiment on the


  1. GENI as an Infrastructure to Study Malicious Overlay Networks Wenke Lee Georgia Ins=tute of Technology

  2. Goals • Use GENI as a large‐scale distributed test‐bed for security research – The best we can get if we can’t experiment on the real Internet • Leapfrog our ability to understand large‐scale malicious networks (botnets) and predict their future trends – Essen=al proper=es of botnets, how botnets must rely on core network services, trade‐offs of botnet design considera=ons, etc. • Evaluate botnet detec=on and removal technologies

  3. A New Look at Botnets • Analyze essen=al proper=es of botnet lifecycle – E.g., botnets are valuable, long‐term resources • Derive axioms that directly follow from the proper=es – E.g., botnets need to have agility to evade detec=on and removal • Derive theories from the axioms – E.g., a par=cular kind of botnet structure has bePer network agility than the others – E.g., by detec=ng and neutralizing the sources of network agility , we can limit botnets’ evasion capabili=es and thus make botnets easier to detect and remove • Apply the theories to prac3ce – E.g., what are the ways that network agility can be realized? – E.g., an on‐line detec=on of naming (DNS) based agility.

  4. An Experimental Approach • Experiment with design and deployment, as well as detec=on and removal of botnets on GENI, e.g., – design various types of botnets – topology structures, characteris=cs/values of essen=al proper=es, etc. – deploy these botnets – measure their propaga=on speed, size, aggregate aPack power, etc. – evaluate detec=on and removal techniques

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend