Security tests and attack experimentations of ProtoGENI.
Jingcheng GaoYang XiaoSneha RaoFnu ShaliniPublished in: Int. J. Secur. Networks (2015)
Keyphrases
- security measures
- cyber attacks
- key exchange protocol
- countermeasures
- security vulnerabilities
- information security
- authentication mechanism
- fault injection
- denial of service attacks
- malicious users
- dos attacks
- malicious attacks
- authentication protocol
- intrusion detection
- access control
- network security
- cyber security
- denial of service
- trust relationships
- attack scenarios
- security risks
- security threats
- encryption algorithm
- security issues
- security problems
- statistical databases
- computer security
- information leakage
- security requirements
- forensic analysis
- key management
- security mechanisms
- security policies
- security management
- malicious nodes
- identity theft
- security model
- block cipher