Abstract
This chapter describes the DETER Project and its centerpiece facility DETERLab. DETERLab is a large-scale, shared, and open modeling, emulation, and experimentation facility for networked systems, developed and operated as a national resource for cyber-security experimentation. The Project itself has three major components:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Note that validity and fidelity are separate, though related, properties.
- 2.
In retrospect, DETER’s selection of the name “containers” was an unfortunate choice, because of the industry’s subsequent adoption of the “container” name to describe a class of lightweight virtualization and software packaging technologies. DETER containers and industry containers are not the same thing and do not serve identical goals, although there is some significant overlap of ideas between the two.
- 3.
MAGI is an abbreviation for “Montage Agent Infrastructure.”
- 4.
A phasor measurement unit (PMU) is a device that measures the power at different points in an electrical grid using a common time source for synchronization. PMUs are recognized as one of the most important measuring devices in future power systems [41].
References
Kessler, G.C.: Defenses against distributed denial of service attacks. Available at http://www.garykessler.net/library/ddos.html. Also included in Bosworth, S., Kabay, M.E., Whyne, E. (eds.) Computer Security Handbook. John Wiley & Sons, March 2014
Hardaker, W., Kindred, D., Ostrenga, R., Sterne, D., Thomas, R.: Justification and requirements for a national DDoS defense technology evaluation facility. NAL Report #02-052, Network Associates Laboratories, Rockville, MD, July 2002
NSF workshop on network research testbeds. Workshop Report, October 2002. http://gaia.cs.umass.edu/testbed_workshop
Balenson, D., Tinnel, L., Benzel, T.: Cybersecurity experimentation of the future (CEF): catalyzing a new generation of experimental cybersecurity research. Available at http://cyberexperimentation.org
Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004
Ostrenga, R., Schwab, S., Braden, R.: A Plan For Malware Containment In The DETER testbed. In: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007
Lockwood, J.W., McKeown, N., Watson, G., Gibb, G., Hartke, P., Naous, J., Raghuraman, R., Luo, J.: NetFPGA—an open platform for gigabit-rate network switching and routing, MSE 2007, San Diego, June 2007. Further information available at http://netfpga.org
Pfaff, B., Pettit, J., Koponen, T., Jackson, E.J., Zhou, A., Rajahalme, J., Gross, J., Wang, A., Stringer, J., Shelar, P., Amidon, K., Casado, M.: The design and implementation of open vSwitch. In: Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2015), Oakland, CA, 4–6 May 2015
Benzel, T., Braden, B., Faber, T., Mirkovic, J., Schwab, S., Sollins, K., Wroclawski, J.: Current developments in DETER cybersecurity testbed technology. In: Proceedings of the Cyber Security Applications & Technology Conference for Homeland Security (CATCH 2009), March 2009
Benzel, T.: The science of cyber-security experimentation: the DETER project. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC) ‘11, Orlando, FL, December 2011
Benzel, T., Wroclawski, J.: The DETER project: towards structural advances in experimental cybersecurity research and evaluation. J. Inform. Process. 20(4), 824–834 (2012)
Mirkovic, J.: Benzel, T.V., Faber, T., Braden, R., Wroclawski, J.T., Schwab, S. The DETER project: advancing the science of cyber security experimentation and test. In: Proceedings of the IEEE HST '10 Conference, Waltham, MA, November 2010
Benzel, T., Braden, R., Kim, D., Joseph, A., Neuman, C., Ostrenga, R., Schwab, S., Sklower, K.: Design, deployment, and use of the DETER testbed. In: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007
Faber, T., Ryan, M.: Building apparatus for multi-resolution networking experiments using containers. ISI Technical Report ISI-TR-683 (2011)
Faber, T., Wroclawski, J., Lahey, K.: A DETER federation architecture. In: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007
Faber, T., Wroclawski, J.: A federated experiment environment for Emulab-based testbeds. In: Proceedings of Tridentcom (2009)
Mirkovic, J., Sollins, K., Wroclawski, J.: Managing the health of security experiments. In: Proceedings of the Cyber security Experimentation and Test (CSET) Workshop, July 2008
Schwab, S., Wilson, B., Ko, C., Hussain, A.: SEER: a security experimentation environment for DETER. In: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test, August 2007
Viswanathan, A., Hussein, A., Mirkovic, J., Schwab, S., Wroclawski, J.: A semantic framework for data analysis in networked systems. In: Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation, NSDI, April 2011
Wroclawski, J., Mirkovic, J., Faber, T., Schwab, S.: A two-constraint approach to risky cyber security experiment management. Invited paper at the Sarnoff Symposium, April 2008
Lahey, K., Braden, R., Sklower, K.: Experiment isolation in a secure cluster testbed. In: Proceedings of the Cyber security Experimentation and Test (CSET) Workshop, July 2008
White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An integrated experimental environment for distributed systems and networks. In: Proceedings of the 5th Symposium on Operating Systems Design & Implementation, pp.255–270, December 2002
Bellard, F.: QEMU, a fast and portable dynamic translator. In: Proceedings of the USENIX 2005 Annual Technical Conference, April 2005, pp. 41–46
OpenVZ Containers Website, http://openvz.org
Gardenghi, L., Goldweber, M., Davoli, R.: View-OS: a new unifying approach against the global view assumption. Lecture Notes in Computer Science, vol. 5101/2008, Computational Science—ICCS 2008. Further information available at http://virtualsquare.org
Faber, T., Schwab, S., Wroclawski, J.: Authorization and access control: ABAC. In: The GENI Book, Springer International Publishing Switzerland, 2016, doi:10.1007/978-3-319-33769-2_10
Ansible Documentation. http://docs.ansible.com/, version of January 2016.
Chef Documentation. https://learn.chef.io/, version of January 2016
Fabric Documentation. http://www.fabfile.org, version of January 2016
Pupper Documentation, https://puppetlabs.com/, version of January 2016
Bratman, M.: Intention, plans, and practical reason (1987)
Johnson-Laird, P.: Mental models (1983)
Wash, R.: Folk models of home computer security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS) (2010)
Stanovich, K.E.: Who is Rational? Studies of Individual Differences in Reasoning. Psychology Press, Hove (1999)
Blythe, J., Camp, J.L.: Implementing mental models. In: Proceedings of IEEE Symposium Security and Privacy Workshops (SPW), pp. 86–90 (2012)
Blythe, J.: A dual-process cognitive model for testing resilient control systems. In: Proceedings of Resilient Control Systems (ISRCS), 2012 5th International Symposium, 2012
Kothari, V., Blythe, J., Smith, S., Koppel, R.: Agent-based modeling of user circumvention of security. In: Proceedings of the 1st International Workshop on Agents and CyberSecurity (2014)
Blythe, J., Koppel, R., Smith, S.W.: Circumvention of security: good users do bad things. IEEE Security & Privacy 11(5), 80–83 (2013)
Presidential Innovation Fellows Program, https://www.whitehouse.gov/innovationfellows, version of October 2015
Baldin, I., Chase, J., Xin, Y., Mandal, A., Ruth, P., Castillo, C., Orlikowski, V., Heermann, C., Mills, J.: ExoGENI: a multi-domain infrastructure-as-a-service testbed. In: GENI: Prototype of the Next Internet. Springer (2016)
Nuqui, R.F.: State estimation and voltage security monitoring using synchronized phasor measurement. Ph.D. Dissertation, Virginia Polytechnic Institute, Blacksburg, VA, July 2001. “Simulations and field experiences suggest that PMUs can revolutionize the way power systems are monitored and controlled” (via Wikipedia)
Mirkovic, J., Benzel, T.: Teaching cybersecurity with DETERLab. IEEE Security and Privacy Magazine, January/February 2012, vol. 10, no. 1, pp. 73–76 (invited paper)
DETERLab Education Web page, http://education.deterlab.net, version of October 2015
Mirkovic, J., Peterson, P.A.H.: Class capture-the-flag exercises. In: Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wroclawski, J. et al. (2016). DETERLab and the DETER Project. In: McGeer, R., Berman, M., Elliott, C., Ricci, R. (eds) The GENI Book. Springer, Cham. https://doi.org/10.1007/978-3-319-33769-2_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-33769-2_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-33767-8
Online ISBN: 978-3-319-33769-2
eBook Packages: Computer ScienceComputer Science (R0)