{"title":"用于评估企业规模网络和运行条件下的网络安全方法的研究设施","authors":"S. Neville","doi":"10.1109/PACRIM.2005.1517327","DOIUrl":null,"url":null,"abstract":"The increased reliance on IT technologies has given rise to an increased risks relative to malicious cyber-security events. Research into the operational testing of cyber-security solutions, particularly within large-scale high bandwidth network environments, has not kept pace with the development of new security approaches and ever increasing network speeds. Current testing methods are generally limited to: (a) experiments conducted on small-scale research networks, (b) experiments conducted on pre-recorded network data or (c) active deployments on operational large scale networks. In the each case, issues exist either in the representativeness of the test environments to real world situations or the scientific repeatability of the experiments or both. A particularly complex issue is the sensitivity of reported results to background (normal) traffic characteristics existing at the time of experimentation. This work, presents the architecture of a cyber-security test facility under development designed address these issues.","PeriodicalId":346880,"journal":{"name":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A research facility for evaluating cyber-security approaches within corporate-scale networks and under operational conditions\",\"authors\":\"S. Neville\",\"doi\":\"10.1109/PACRIM.2005.1517327\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increased reliance on IT technologies has given rise to an increased risks relative to malicious cyber-security events. Research into the operational testing of cyber-security solutions, particularly within large-scale high bandwidth network environments, has not kept pace with the development of new security approaches and ever increasing network speeds. Current testing methods are generally limited to: (a) experiments conducted on small-scale research networks, (b) experiments conducted on pre-recorded network data or (c) active deployments on operational large scale networks. In the each case, issues exist either in the representativeness of the test environments to real world situations or the scientific repeatability of the experiments or both. A particularly complex issue is the sensitivity of reported results to background (normal) traffic characteristics existing at the time of experimentation. This work, presents the architecture of a cyber-security test facility under development designed address these issues.\",\"PeriodicalId\":346880,\"journal\":{\"name\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-10-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PACRIM.2005.1517327\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PACRIM.2005.1517327","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A research facility for evaluating cyber-security approaches within corporate-scale networks and under operational conditions
The increased reliance on IT technologies has given rise to an increased risks relative to malicious cyber-security events. Research into the operational testing of cyber-security solutions, particularly within large-scale high bandwidth network environments, has not kept pace with the development of new security approaches and ever increasing network speeds. Current testing methods are generally limited to: (a) experiments conducted on small-scale research networks, (b) experiments conducted on pre-recorded network data or (c) active deployments on operational large scale networks. In the each case, issues exist either in the representativeness of the test environments to real world situations or the scientific repeatability of the experiments or both. A particularly complex issue is the sensitivity of reported results to background (normal) traffic characteristics existing at the time of experimentation. This work, presents the architecture of a cyber-security test facility under development designed address these issues.