{"id":411,"date":"2013-09-19T17:54:36","date_gmt":"2013-09-20T00:54:36","guid":{"rendered":"http:\/\/ant.isi.edu\/blog\/?p=411"},"modified":"2020-10-19T10:23:23","modified_gmt":"2020-10-19T17:23:23","slug":"new-conference-paper-replay-of-malicious-traffic-in-network-testbeds-in-ieee-conf-on-technologies-for-homeland-security-hst","status":"publish","type":"post","link":"https:\/\/ant.isi.edu\/blog\/?p=411","title":{"rendered":"new conference paper &#8220;Replay of Malicious Traffic in Network Testbeds&#8221; in IEEE Conf. on Technologies for Homeland Security (HST)"},"content":{"rendered":"<p>The paper &#8220;Replay of Malicious Traffic in Network Testbeds&#8221; (by Alefiya Hussain, Yuri Pradkin, and John Heidemann) will appear in the 3th IEEE Conference on\u00a0Technologies for Homeland Security (HST) in Waltham, Mass. in Nov. 2013. \u00a0The paper is available at\u00a0\u00a0<a href=\"http:\/\/www.isi.edu\/~johnh\/PAPERS\/Hussain13a\/\">http:\/\/www.isi.edu\/~johnh\/PAPERS\/Hussain13a<\/a>.<\/p>\n<p><a href=\"http:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2013\/09\/Hussain13a_icon.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-412\" alt=\"Hussain13a_icon\" src=\"http:\/\/ant.isi.edu\/blog\/wp-content\/uploads\/2013\/09\/Hussain13a_icon-300x139.png\" width=\"300\" height=\"139\" \/><\/a>From the paper&#8217;s abstract:<\/p>\n<blockquote><p>In this paper we present tools and methods to integrate attack measurements from the Internet with controlled experimentation on a network testbed. We show that this approach provides greater fidelity than synthetic models. We compare the statistical properties of real-world attacks with synthetically generated constant bit rate attacks on the testbed. Our results indicate that trace replay provides fine time-scale details that may be absent in constant bit rate attacks. Additionally, we demonstrate the effectiveness of our approach to study new and emerging attacks. We replay an Internet attack captured by the LANDER system on the DETERLab testbed within two hours.<\/p><\/blockquote>\n<p>Data from the paper is available as\u00a0DoS_DNS_amplification-20130617 from <a href=\"http:\/\/www.isi.edu\/ant\/traces\/\">the authors<\/a> or http:\/\/www.predict.org, and the tools are\u00a0<a href=\"http:\/\/montage.deterlab.net\/magi\/hst2013tools\/\">at deterlab<\/a>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The paper &#8220;Replay of Malicious Traffic in Network Testbeds&#8221; (by Alefiya Hussain, Yuri Pradkin, and John Heidemann) will appear in the 3th IEEE Conference on\u00a0Technologies for Homeland Security (HST) in Waltham, Mass. in Nov. 2013. \u00a0The paper is available at\u00a0\u00a0http:\/\/www.isi.edu\/~johnh\/PAPERS\/Hussain13a. From the paper&#8217;s abstract: In this paper we present tools and methods to integrate attack [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[284,282],"tags":[73,24,72,63,58,67,8,74,10,29,21,5,41,18,16,75,57],"class_list":["post-411","post","type-post","status-publish","format-standard","hentry","category-papers-publications","category-publications","tag-attack-traffic","tag-conference","tag-deter","tag-dns","tag-isi","tag-lacrend","tag-lander","tag-modeling","tag-network-datasets","tag-network-traffic","tag-packet-trace-collection","tag-papers","tag-predict","tag-security","tag-software","tag-testbeds","tag-usc"],"_links":{"self":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=411"}],"version-history":[{"count":5,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/411\/revisions"}],"predecessor-version":[{"id":417,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=\/wp\/v2\/posts\/411\/revisions\/417"}],"wp:attachment":[{"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ant.isi.edu\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}