An overview of linux container based network emulation
- Peach, Schalk, Irwin, Barry V W, van Heerden, Renier
- Authors: Peach, Schalk , Irwin, Barry V W , van Heerden, Renier
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430095 , vital:72665 , https://www.proceedings.com/30838.html
- Description: The objective of this paper is to assess the current state of Container-Based Emulator implementations on the Linux platform. Through a nar-rative overview, a selection of open source Container-Based emulators are analysed to collect information regarding the technologies used to construct them to assess the current state of this emerging technology. Container-Based Emulators allows the creation of small emulated net-works on commodity hardware through the use of kernel level virtualiza-tion techniques, also referred to as containerisation. Container-Based Emulators act as a management tool to control containers and the ap-plications that execute within them. The ability of Container Based Emu-lators to create repeatable and controllable test networks makes it ideal for use as training and experimentation tools in the information security and network management fields. Due to the ease of use and low hard-ware requirements, the tools present a low cost alternative to other forms of network experimentation platforms. Through a review of cur-rent literature and source code, the current state of Container-Based Emulators is assessed.
- Full Text:
- Date Issued: 2016
- Authors: Peach, Schalk , Irwin, Barry V W , van Heerden, Renier
- Date: 2016
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/430095 , vital:72665 , https://www.proceedings.com/30838.html
- Description: The objective of this paper is to assess the current state of Container-Based Emulator implementations on the Linux platform. Through a nar-rative overview, a selection of open source Container-Based emulators are analysed to collect information regarding the technologies used to construct them to assess the current state of this emerging technology. Container-Based Emulators allows the creation of small emulated net-works on commodity hardware through the use of kernel level virtualiza-tion techniques, also referred to as containerisation. Container-Based Emulators act as a management tool to control containers and the ap-plications that execute within them. The ability of Container Based Emu-lators to create repeatable and controllable test networks makes it ideal for use as training and experimentation tools in the information security and network management fields. Due to the ease of use and low hard-ware requirements, the tools present a low cost alternative to other forms of network experimentation platforms. Through a review of cur-rent literature and source code, the current state of Container-Based Emulators is assessed.
- Full Text:
- Date Issued: 2016
Automated classification of computer network attacks
- van Heerden, Renier, Leenen, Louise, Irwin, Barry V W
- Authors: van Heerden, Renier , Leenen, Louise , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429622 , vital:72627 , 10.1109/ICASTech.2013.6707510
- Description: In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.
- Full Text:
- Date Issued: 2013
- Authors: van Heerden, Renier , Leenen, Louise , Irwin, Barry V W
- Date: 2013
- Subjects: To be catalogued
- Language: English
- Type: text , article
- Identifier: http://hdl.handle.net/10962/429622 , vital:72627 , 10.1109/ICASTech.2013.6707510
- Description: In this paper we demonstrate how an automated reasoner, HermiT, is used to classify instances of computer network based attacks in conjunction with a network attack ontology. The ontology describes different types of network attacks through classes and inter-class relationships and has previously been implemented in the Protege ontology editor. Two significant recent instances of network based attacks are presented as individuals in the ontology and correctly classified by the automated reasoner according to the relevant types of attack scenarios depicted in the ontology. The two network attack instances are the Distributed Denial of Service attack on SpamHaus in 2013 and the theft of 42 million Rand ($6.7 million) from South African Postbank in 2012.
- Full Text:
- Date Issued: 2013
- «
- ‹
- 1
- ›
- »