Building a Cybersecurity Research and Experimentation Testbed

@article{Hsieh2018BuildingAC,
  title={Building a Cybersecurity Research and Experimentation Testbed},
  author={George Hsieh and Tonya Fields and Bigyan Kc and Jonah Yurko-Galvin},
  journal={2018 International Conference on Computational Science and Computational Intelligence (CSCI)},
  year={2018},
  pages={30-35}
}
Cybersecurity is critically important to nations and societies. However, it has proven difficult for cybersecurity researchers to quantitatively and experimentally analyze, compare and validate the effectiveness of various offensive and defensive mechanisms. The Cyber Analysis, Simulation and Experimentation Environment (CASE-V) project is focused on developing a secure, highly available, feature rich and flexible framework and testbed. CASE-V includes two foundational platforms: OpenStack… CONTINUE READING

Figures and Tables from this paper.

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

Automating Deployment of Gh0st Remote Access Trojan Malware

  • B. Johnson, G. Hsieh, M. Hoppa
  • 2018 Int'l Conf. on Security and Management (SAM'18), Las Vegas, NV, 2018. 34
  • 2018
VIEW 1 EXCERPT

Developing a UI and Automation Framework for a Cybersecurity Research and Experimentation Environment

  • C. Butler, G. Thompson, G. Hsieh, M. Hoppa, K. S. Nauer
  • 2018 Int'l Conf. on Security and Management (SAM'18), Las Vegas, NV, 2018.
  • 2018
VIEW 1 EXCERPT

TwitterOSINT: Automated Cybersecurity Threat Intelligence Collection and Analysis using Twitter Data

  • S. R. Vadapalli, G. Hsieh, K. S. Nauer
  • 2018 Int'l Conf. on Security & Management (SAM'18), Las Vegas, NV, 2018.
  • 2018
VIEW 1 EXCERPT

2017 Cost of Cyber Crime Study

  • Ponemon Institute
  • 1 Oct 2017. [Online]. Available: https://www.ponemon.org/blog/2017-cost-ofcyber-crime-study. [Accessed 6 Oct 2018].
  • 2017
VIEW 1 EXCERPT

Building a Gh0st Malware Experimentation Environment

  • V. Boinapally, G. Hsieh, K. S. Nauer
  • 2017 Int'l Conf. on Security and Management (SAM'17), Las Vegas, NV, 2017.
  • 2017
VIEW 1 EXCERPT

Deep Learning Approach to Malware Multi-class Classification Using Image Processing Techniques

VIEW 1 EXCERPT

Cybersecurity Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research

  • D. Balenson, L. Tinnel, T. Benzel
  • 2015.
  • 2015
VIEW 2 EXCERPTS