BibTex RIS Cite

Siber Güvenlik Deneyleri için Ağ Benzetici ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme

Year 2013, Volume: 6 Issue: 1, - , 24.06.2016

Abstract

Internet altyapısının güvenliği üzerine denemeler ve eğitimler sağlamak için siber güvenlik deneylerinin ve tatbikatlarının yapılması gereklidir. Bu çalışmada, bu deneyler için kullanılabilecek ağ benzetici, öykünüm ve sınama ortamlarının kullanımına dair bir ön inceleme sunulmuştur. Ağ sınama ortamları tanımlanmış; Emulab ve Epic sınama ortamı ayrıntılı olarak tanıtılmıştır. Ağ sınama ortamı kurulması için gereklilikler çalışmada önerilmiştir.

References

  • Internet Usage Statistics, 10.03.2011 tarihinde erişildi, http://internetworldstats.com/stats.htm
  • Emre B., İnternet Güvenliğinin Tarihçesi, Tübitak BİLGEM dergisi, Cilt 3, Sayı:5, 2011
  • Karabacak B., Kritik Altyapılar, Dünya ve Türkiye Özeti, Tübitak BİLGEM dergisi, Cilt 3, Sayı:5, 2011
  • Internet stability and security, 17.02.2011 tarihinde erişildi, http://sta.jrc.ec.europa.eu/index.php/interne t-stability-and-security
  • Protecting Europe from large scale cyberattacks and disruptions, 17.02.2011 tarihinde erişildi, http://europa.eu/legislation_summaries/just ice_freedom_security/fight_against_organi sed_crime/si0010_en.htm
  • Tübitak BİLGEM Siber Güvenlik Tatbikatı, 22.02.2011 tarihinde erişildi, http://www.uekae.tubitak.gov.tr/home.do?o t=5&rt=&sid=0&pid=0&cid=8322
  • Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on Critical Information Infrastructure Protection - "Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience" {SEC(2009) 399} {SEC(2009) 400} http://eurlex.europa.eu/LexUriServ/LexUriServ.do? uri=CELEX:52009DC0149:EN:NOT
  • Towards the first pan-european exercise on Critical ICT Infrastructure Protection, ENISA Quarterly Review Vol. 6, No. 2, June 2010; http://www.enisa.europa.eu/publications/eq r/issues/eqr-q2-2010-vol.-6-no.-2
  • CYBER EUROPE 2010 - First Ever PanEuropean Exercise on Large Scale ICT Incidents, ENISA Quarterly Review Vol. 6, No. 4, December 2010, http://www.enisa.europa.eu/publications/eq r/issues/eqr-q4-2010-vol.-7-no.-4
  • 0] European Commission, Digital Agenda: cyber-security experts test defences in first pan-European simulation, 2010, http://europa.eu/rapid/pressReleasesAction.do?r eference=IP/10/1459&format=HTML&aged=0 &language=EN&guiLanguage=en
  • 1] Digital Agenda for Europe: key initiatives, 17.02.2011 tarihinde erişildi, http://europa.eu/rapid/pressReleasesAction .do?reference=MEMO/10/200&format=H TML&aged=0&language=EN&guiLangua ge=en
  • 2] JRC poster for "CYBER EUROPE 2010", 17.02.2011 tarihinde erişildi, http://sta.jrc.ec.europa.eu/pdf/scni/publicati ons/cyber-europe-2010-a3size.pdf
  • 3] Ammar, M., 2005, Why We STILL Don't Know How to Simulate Networks. 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 179-179. IEEE. doi: 10.1109/MASCOTS.2005.76. http://www.cc.gatech.edu/%7Eammar/pres entations/ANSS/ANSSKEY_files/frame.htm
  • 4] Lacage M., NS-3 Trilogy yaz okulu konuşmaları, 2009, http://www.nsnam.org/tutorials/trilogysummer-school.pdf
  • 5] The ns-3 network simulator, 17.02.2011 tarihinde erişildi, http://www.nsnam.org
  • 6] Henderson T., Lacage M., ns-3 tutorial, 2009, http://www.nsnam.org/workshops/wns32009/ns-3-tutorial-part-1.pdf
  • 7] Muessig, P., Laack, D., Wrobleski, J. (2001). An integrated approach to evaluating simulation credibility. Citeseer. Retrieved February 16, 2011, from http://oai.dtic.mil/oai/oai?verb=getRecord &metadataPrefix=html&identifie r=ADA405051
  • 8] Report of nsf workshop on network research testbeds, National Science Foundation, (2002), http://wwwnet.cs.umass.edu/testbed_workshop/testbed _workshop_report_final.pdf
  • 9] Emulab-Network Emulation Testbed, http://www.emulab.net/
  • 0] ORBIT, 17.02.2011 tarihinde erişildi, http://www.orbit-lab.org/
  • 1] Senslab, http://www.senslab.info/
  • 2] Planetlab, 17.02.2011 tarihinde erişildi, http://www.planet-lab.org/
  • 3] GENI, Exploring Networks of the Future, http://www.geni.net/
  • 4] Onelab, Future Internet Testbeds, http://www.onelab.eu/
  • 5] Slice-Based Facility Architecture(v0.8), 2007, http://www.cs.princeton.edu/~llp/arch_abri dged.pdf
  • 6] E. Eide, L. Stoller, J. Lepreau., 2007, An experimentation workbench for replayable networking research. In 4th USENIX Symposium on Networked Systems Design & Implementation, pages 215-228.
  • 7] Siaterlis, C., Masera, M., 2010, The development of the Internet resilience laboratory at IPSC, JRC Technical Report 57145. Office. Retrieved from http://sta.jrc.ec.europa.eu/pdf/scni/publicati ons/report_57145.pdf
  • 8] EPIC Description Leaflet, 17.02.2011 tarihinde erişildi, http://sta.jrc.ec.europa.eu/pdf/scni/publicati ons/LAB_poster_epic_A3.pdf
  • 9] Tribe Flood Network 2000 (TFN2K), http://packetstormsecurity.com/distributed/ tfn2k.tgz
  • 0] Scapy, http://www.secdev.org/projects/scapy/
  • 1] Tcpdump & Libpcap, http://www.tcpdump.org/
  • 2] iperf, http://iperf.sourceforge.net/
  • 3] Zabbix, http://www.zabbix.com
  • 4] Karaarslan E., 2001, Büyük ölçekli rastsal ve asal sayı üretimi, Ege Üniversitesi Fen Bilimleri Ensitütüsü Yüksek Lisans Tezi, Tez no: 113994,
  • 5] Weingartner, E., Vom Lehn, H., Wehrle, K., 2009, A Performance Comparison of Recent Network Simulators. 2009 IEEE International Conference on Communications, 1-5. IEEE. doi: 10.1109/ICC.2009.5198
  • 6] Siaterlis C., Masera M., 2010, A survey of software tools for the creation of networked testbeds, International Journal On Advances in Security, ISSN. 19422636, vol. 4, No. 1-2, pp.1-12

A Preliminary Study on Using Network Simulation and Network Testbeds for Cyber Security Experiments

Year 2013, Volume: 6 Issue: 1, - , 24.06.2016

Abstract

Cyber security experiments and excercises are required in order to provide trainings and practices on security of the internet infrastructure. In this study, a prior review was presented regarding to use network simulation, emulation and testbeds which can be used for these experiments. Network testbeds are defined; Emulab and Epic testbed has been described in detail. Requirements to setup a network testbed are recommended in the study.

References

  • Internet Usage Statistics, 10.03.2011 tarihinde erişildi, http://internetworldstats.com/stats.htm
  • Emre B., İnternet Güvenliğinin Tarihçesi, Tübitak BİLGEM dergisi, Cilt 3, Sayı:5, 2011
  • Karabacak B., Kritik Altyapılar, Dünya ve Türkiye Özeti, Tübitak BİLGEM dergisi, Cilt 3, Sayı:5, 2011
  • Internet stability and security, 17.02.2011 tarihinde erişildi, http://sta.jrc.ec.europa.eu/index.php/interne t-stability-and-security
  • Protecting Europe from large scale cyberattacks and disruptions, 17.02.2011 tarihinde erişildi, http://europa.eu/legislation_summaries/just ice_freedom_security/fight_against_organi sed_crime/si0010_en.htm
  • Tübitak BİLGEM Siber Güvenlik Tatbikatı, 22.02.2011 tarihinde erişildi, http://www.uekae.tubitak.gov.tr/home.do?o t=5&rt=&sid=0&pid=0&cid=8322
  • Communication from the Commission to the European Parliament, the Council, the European Economic and Social Committee and the Committee of the Regions on Critical Information Infrastructure Protection - "Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience" {SEC(2009) 399} {SEC(2009) 400} http://eurlex.europa.eu/LexUriServ/LexUriServ.do? uri=CELEX:52009DC0149:EN:NOT
  • Towards the first pan-european exercise on Critical ICT Infrastructure Protection, ENISA Quarterly Review Vol. 6, No. 2, June 2010; http://www.enisa.europa.eu/publications/eq r/issues/eqr-q2-2010-vol.-6-no.-2
  • CYBER EUROPE 2010 - First Ever PanEuropean Exercise on Large Scale ICT Incidents, ENISA Quarterly Review Vol. 6, No. 4, December 2010, http://www.enisa.europa.eu/publications/eq r/issues/eqr-q4-2010-vol.-7-no.-4
  • 0] European Commission, Digital Agenda: cyber-security experts test defences in first pan-European simulation, 2010, http://europa.eu/rapid/pressReleasesAction.do?r eference=IP/10/1459&format=HTML&aged=0 &language=EN&guiLanguage=en
  • 1] Digital Agenda for Europe: key initiatives, 17.02.2011 tarihinde erişildi, http://europa.eu/rapid/pressReleasesAction .do?reference=MEMO/10/200&format=H TML&aged=0&language=EN&guiLangua ge=en
  • 2] JRC poster for "CYBER EUROPE 2010", 17.02.2011 tarihinde erişildi, http://sta.jrc.ec.europa.eu/pdf/scni/publicati ons/cyber-europe-2010-a3size.pdf
  • 3] Ammar, M., 2005, Why We STILL Don't Know How to Simulate Networks. 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 179-179. IEEE. doi: 10.1109/MASCOTS.2005.76. http://www.cc.gatech.edu/%7Eammar/pres entations/ANSS/ANSSKEY_files/frame.htm
  • 4] Lacage M., NS-3 Trilogy yaz okulu konuşmaları, 2009, http://www.nsnam.org/tutorials/trilogysummer-school.pdf
  • 5] The ns-3 network simulator, 17.02.2011 tarihinde erişildi, http://www.nsnam.org
  • 6] Henderson T., Lacage M., ns-3 tutorial, 2009, http://www.nsnam.org/workshops/wns32009/ns-3-tutorial-part-1.pdf
  • 7] Muessig, P., Laack, D., Wrobleski, J. (2001). An integrated approach to evaluating simulation credibility. Citeseer. Retrieved February 16, 2011, from http://oai.dtic.mil/oai/oai?verb=getRecord &metadataPrefix=html&identifie r=ADA405051
  • 8] Report of nsf workshop on network research testbeds, National Science Foundation, (2002), http://wwwnet.cs.umass.edu/testbed_workshop/testbed _workshop_report_final.pdf
  • 9] Emulab-Network Emulation Testbed, http://www.emulab.net/
  • 0] ORBIT, 17.02.2011 tarihinde erişildi, http://www.orbit-lab.org/
  • 1] Senslab, http://www.senslab.info/
  • 2] Planetlab, 17.02.2011 tarihinde erişildi, http://www.planet-lab.org/
  • 3] GENI, Exploring Networks of the Future, http://www.geni.net/
  • 4] Onelab, Future Internet Testbeds, http://www.onelab.eu/
  • 5] Slice-Based Facility Architecture(v0.8), 2007, http://www.cs.princeton.edu/~llp/arch_abri dged.pdf
  • 6] E. Eide, L. Stoller, J. Lepreau., 2007, An experimentation workbench for replayable networking research. In 4th USENIX Symposium on Networked Systems Design & Implementation, pages 215-228.
  • 7] Siaterlis, C., Masera, M., 2010, The development of the Internet resilience laboratory at IPSC, JRC Technical Report 57145. Office. Retrieved from http://sta.jrc.ec.europa.eu/pdf/scni/publicati ons/report_57145.pdf
  • 8] EPIC Description Leaflet, 17.02.2011 tarihinde erişildi, http://sta.jrc.ec.europa.eu/pdf/scni/publicati ons/LAB_poster_epic_A3.pdf
  • 9] Tribe Flood Network 2000 (TFN2K), http://packetstormsecurity.com/distributed/ tfn2k.tgz
  • 0] Scapy, http://www.secdev.org/projects/scapy/
  • 1] Tcpdump & Libpcap, http://www.tcpdump.org/
  • 2] iperf, http://iperf.sourceforge.net/
  • 3] Zabbix, http://www.zabbix.com
  • 4] Karaarslan E., 2001, Büyük ölçekli rastsal ve asal sayı üretimi, Ege Üniversitesi Fen Bilimleri Ensitütüsü Yüksek Lisans Tezi, Tez no: 113994,
  • 5] Weingartner, E., Vom Lehn, H., Wehrle, K., 2009, A Performance Comparison of Recent Network Simulators. 2009 IEEE International Conference on Communications, 1-5. IEEE. doi: 10.1109/ICC.2009.5198
  • 6] Siaterlis C., Masera M., 2010, A survey of software tools for the creation of networked testbeds, International Journal On Advances in Security, ISSN. 19422636, vol. 4, No. 1-2, pp.1-12
There are 36 citations in total.

Details

Other ID JA37KD32AK
Journal Section Makaleler(Araştırma)
Authors

Enis Karaarslan This is me

Publication Date June 24, 2016
Published in Issue Year 2013 Volume: 6 Issue: 1

Cite

APA Karaarslan, E. (2016). Siber Güvenlik Deneyleri için Ağ Benzetici ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, 6(1).
AMA Karaarslan E. Siber Güvenlik Deneyleri için Ağ Benzetici ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme. TBV-BBMD. June 2016;6(1).
Chicago Karaarslan, Enis. “Siber Güvenlik Deneyleri için Ağ Benzetici Ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi 6, no. 1 (June 2016).
EndNote Karaarslan E (June 1, 2016) Siber Güvenlik Deneyleri için Ağ Benzetici ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 6 1
IEEE E. Karaarslan, “Siber Güvenlik Deneyleri için Ağ Benzetici ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme”, TBV-BBMD, vol. 6, no. 1, 2016.
ISNAD Karaarslan, Enis. “Siber Güvenlik Deneyleri için Ağ Benzetici Ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri ve Mühendisliği Dergisi 6/1 (June 2016).
JAMA Karaarslan E. Siber Güvenlik Deneyleri için Ağ Benzetici ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme. TBV-BBMD. 2016;6.
MLA Karaarslan, Enis. “Siber Güvenlik Deneyleri için Ağ Benzetici Ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme”. Türkiye Bilişim Vakfı Bilgisayar Bilimleri Ve Mühendisliği Dergisi, vol. 6, no. 1, 2016.
Vancouver Karaarslan E. Siber Güvenlik Deneyleri için Ağ Benzetici ve Ağ Sınama Ortamlarının Kullanımına Dair Ön İnceleme. TBV-BBMD. 2016;6(1).

Article Acceptance

Use user registration/login to upload articles online.

The acceptance process of the articles sent to the journal consists of the following stages:

1. Each submitted article is sent to at least two referees at the first stage.

2. Referee appointments are made by the journal editors. There are approximately 200 referees in the referee pool of the journal and these referees are classified according to their areas of interest. Each referee is sent an article on the subject he is interested in. The selection of the arbitrator is done in a way that does not cause any conflict of interest.

3. In the articles sent to the referees, the names of the authors are closed.

4. Referees are explained how to evaluate an article and are asked to fill in the evaluation form shown below.

5. The articles in which two referees give positive opinion are subjected to similarity review by the editors. The similarity in the articles is expected to be less than 25%.

6. A paper that has passed all stages is reviewed by the editor in terms of language and presentation, and necessary corrections and improvements are made. If necessary, the authors are notified of the situation.

0

.   This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.