Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
The Internet has become an essential part of normal operations of both
public and private sectors. Many security issues are not addressed in
the original Internet design, and security now has become a large
concern for networking research and study. There is an imperative need
to have an simulation environment that can be used to help study
security-related research problems. In the thesis we present our
effort to build such an environment: Real-time Immersive Network
Simulation Environment (RINSE). RINSE features flexible configuration
of models using various networking protocols and real-time user
interaction. We also present the Estimate Next Infection (ENI) model
we developed for Internet scanning worms using RINSE, and the effort
of combining multiple resolutions in worm modeling.
Masters thesis. Advisor: David Nicol
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
Yougu Yuan, "On the Design of an Immersive Environment for Security-Related Studies." Dartmouth Computer Science Technical Report TR2005-552, August 2005.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.