Security tests and attack experimentations of ProtoGENI

Tests and experiments to investigate selected security issues through ProtoGENI are conducted throughout this paper. The ProtoGENI is through its Spiral 1 time period, which primarily focuses on developing control and aggregating functions, up to the beginning of Spiral 4 time period now. Spiral 4 focuses on the transition from a rapid-prototyping effort to a 'real GENI' that supports network research experimentation. Owing to the lack of security related functions in the ProtoGENI's initial status, there is a necessity to explore the security vulnerabilities of ProtoGENI. Throughout the past several Spiral time periods, we designed four major sets of security tests and experiments, to examine certain types of its security vulnerabilities. All of the above tests and experiments showed that it is very possible that ProtoGENI nodes may render vulnerabilities to these attacks.

[1]  Daisuke Takahashi,et al.  IEEE 802.11 user fingerprinting and its applications for intrusion detection , 2010, Comput. Math. Appl..

[2]  Yang Xiao,et al.  Outlier detection based fault tolerant data aggregation for wireless sensor networks , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).

[3]  Jing Liu,et al.  Authentication and Access Control in the Internet of Things , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.

[4]  Cliff Changchun Zou,et al.  Wi-Fi access denial of service attack to smartphones , 2013, Int. J. Secur. Networks.

[5]  Yang Xiao,et al.  Network forensics analysis using Wireshark , 2015, Int. J. Secur. Networks.

[6]  Yang Xiao,et al.  Integration of mobility and intrusion detection for wireless ad hoc networks , 2007, Int. J. Commun. Syst..

[7]  Yang Xiao,et al.  Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.

[8]  Wei Jiang,et al.  Botnet: Survey and Case Study , 2009, 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC).

[9]  Yi Pan,et al.  Security mechanisms, attacks and security enhancements for the IEEE 802.11 WLANs , 2006, Int. J. Wirel. Mob. Comput..

[10]  Victor C. M. Leung,et al.  Enhancing security using mobility-based anomaly detection in cellular mobile networks , 2006, IEEE Trans. Veh. Technol..

[11]  Geoffrey G. Xie,et al.  Fault Tolerance Experiments in 4D Future Internet Architecture , 2010 .

[12]  Anat Bremler-Barr,et al.  Spoofing prevention method , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[13]  Bo Fu,et al.  A review of GENI authentication and access control mechanisms , 2013, Int. J. Secur. Networks.

[14]  Bilal Khan,et al.  Finding DDoS attack sources: Searchlight localization algorithm for network tomography , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.

[15]  Bo Sun,et al.  Integration of mobility and intrusion detection for wireless ad hoc networks: Research Articles , 2007 .

[16]  John S. Heidemann,et al.  A framework for classifying denial of service attacks , 2003, SIGCOMM '03.

[17]  Yang Xiao,et al.  Attacks and countermeasures in multi-hop Cognitive Radio Networks , 2009, Int. J. Secur. Networks.

[18]  Vijay Laxmi,et al.  Sybil attack detection in VANET using neighbouring vehicles , 2014, Int. J. Secur. Networks.

[19]  Jing Liu,et al.  Internet of things' authentication and access control , 2012, Int. J. Secur. Networks.

[20]  Yang Xiao,et al.  Cyber Security and Privacy Issues in Smart Grids , 2012, IEEE Communications Surveys & Tutorials.

[21]  Ping Zhang,et al.  A taxonomy of privilege escalation attacks in Android applications , 2014, Int. J. Secur. Networks.

[22]  Yang Xiao,et al.  Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks , 2007, Int. J. Wirel. Mob. Comput..

[23]  Yang Xiao,et al.  Anomaly Detection Based Secure In-Network Aggregation for Wireless Sensor Networks , 2013, IEEE Systems Journal.

[24]  Christopher W. Badenhop,et al.  A black hole attack model using topology approximation for reactive ad-hoc routing protocols , 2014, Int. J. Secur. Networks.

[25]  Yang Xiao,et al.  Detection of Fraudulent Usage in Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.