CERIAS - Center for Education and Research in Information Assurance and Security

Skip Navigation
Purdue University
Center for Education and Research in Information Assurance and Security

Router Models and Downscaling Tools for Scalable Security Experiments

Research Areas: Network Security

Principal Investigator: Sonia Fahmy

A major challenge that researchers face in studying attacks over the Internet is the size of the network to be investigated. For example, a typical Denial of Service (DoS) attack usually takes place over a large portion of the Internet and involves a considerable number of hosts. This can be intractable for testbed experimentation, and even simulation. The goal of this project is twofold: (1) devise solutions to the scalability problem for both network simulation and emulation experiments by partitioning a large network experiment into multiple smaller experiments which are manageable in the simulation or emulation testbed, and (2) develop device-agnostic simulation and emulation models for forwarding devices, such as switches and routers, and design an automated model parameter inference process.


Students: Ravish Khosla Wei-Min Yao

Representative Publications

  • Wei-Min Yao, Sonia Fahmy, "Partitioning Network Testbed Experiments,"
    In Proceedings of IEEE
    International Conference on Distributed Computing Systems (ICDCS),
    11 pp., June 2011.

  • Wei-Min Yao, Sonia Fahmy, "Downscaling Network Scenarios with Denial of Service (DoS) Attacks," In Proceedings of the IEEE Sarnoff Symposium (Invited Session on Security), 6 pages, April 2008.

  • Roman Chertov, Sonia Fahmy, and Ness B. Shroff, "Fidelity of Network Simulation and Emulation: A Case Study of TCP-Targeted Denial of Service Attacks," ACM Transactions on Modeling and Computer Simulation (TOMACS), volume 19, issue 1, pp. 4:1-4:29, December 2008.

  • J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher, R. K. Thomas, "Accurately measuring denial of service in     simulation and testbed experiments," IEEE Transactions on Dependable and Secure Computing (TDSC), volume 6, issue 2, pp. 81-95, Apr/June 2009.