= DETER Experimentation Resources = == Software == * [http://seer.deterlab.net SEER Workbench] * DETER's Security Experimentation Environment (SEER) is a GUI-based user interface to DETERlab, helping an experimenter to set up, script, and perform experiments in the DETER environment. The SEER back-end includes a set of tools and agents for traffic generation, attack generation, traffic collection, and data analysis. * [http://thirdeye.deterlab.net/ Semantic Analysis Framework (SAF)] * !SAF is a framework for offline data analysis of networked and distributed system data. It enables users to analyse and reason over data using semantically meaningful abstractions and thus at a level closer to their understanding of system operation. * [http://fedd.deterlab.net/trac DETER Federation] * The DETER federation architecture is a model and mechanism for creating experiments that span multiple testbeds. We have written several papers about the architecture. This site is the home for our prototype implementation, fedd. * [http://abac.deterlab.net/ ABAC] * ABAC (Attribute-Based Access Control) is a software library and suite of tools which act as a framework for doing distributed access control. It is used in the DETER federation architecture. == Other Resources == * [http://www.isi.edu/deter/tools.html DETERlab tools] * Other tools developed for DETERlab experimenters. * [https://trac.deterlab.net/wiki/Topologies Sample topologies] * Some sample topologies that may be useful to experimenters == Home Pages == * [wiki:WikiStart DETERlab documentation home page] * [http://www.isi.edu/deter DETER Project homepage]