Changes between Initial Version and Version 1 of T1T2


Ignore:
Timestamp:
Jul 24, 2012 12:06:26 PM (12 years ago)
Author:
sunshine
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • T1T2

    v1 v1  
     1We define as a ''risky'' experiment each experiment that either uses some type of malware such as DoS tool, a worm, an exploit, etc, even when the malware code is written by the experimenter and/or requires connectivity to the outside directly from experimental nodes. We recognize all these experiment types are interesting and important to facilitate new research in security. At the same time there is potential risk to the testbed and the Internet that must be contained. This risk includes:
     2
     3* Malware interfering with other experiments on DETER
     4* Malware escaping to the outside world
     5* Malware overwhelming critical infrastructure in DETER, such as users and boss machines and control network
     6* Malware from the outside world infecting experimental machines and spreading in DETER or propagating back to the outside (with implications of DETER unwittingly participating in attacks).
     7We have developed strategies to contain experiment risk while allowing users to observe phenomena of interest to them. This means that containment is customized for each experiment. This customization is performed automatically depending on information a user specifies on Begin Experiment Web page.