This HTML5 document contains 57 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n17http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n22http://purl.org/net/nknouf/ns/bibtex#
n16http://localhost/temp/predkladatel/
n21http://linked.opendata.cz/resource/domain/vavai/projekt/
n8http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n19http://linked.opendata.cz/ontology/domain/vavai/
n10https://schema.org/
n5http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F00216224%3A14610%2F14%3A00073216%21RIV15-MV0-14610___/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
rdfshttp://www.w3.org/2000/01/rdf-schema#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n15http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n13http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n11http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F00216224%3A14610%2F14%3A00073216%21RIV15-MV0-14610___
rdf:type
n19:Vysledek skos:Concept
rdfs:seeAlso
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6838272
dcterms:description
Cyber attacks have become ubiquitous and in order to face current threats it is important to understand them. Studying attacks in a real environment however, is not viable and therefore it is necessary to find other methods how to examine the nature of attacks. Gaining detailed knowledge about them facilitates designing of new detection methods as well as understanding their impact. In this paper we present a testbed framework to simulate attacks that enables to study a wide range of security scenarios. The framework provides a notion of real-world arrangements, yet it retains full control over all the activities performed within the simulated infrastructures. Utilizing the sandbox environment, it is possible to simulate various security attacks and evaluate their impacts on real infrastructures. The design of the framework benefits from IaaS clouds. Therefore its deployment does not require dedicated facilities and the testbed can be deployed over miscellaneous contemporary clouds. Cyber attacks have become ubiquitous and in order to face current threats it is important to understand them. Studying attacks in a real environment however, is not viable and therefore it is necessary to find other methods how to examine the nature of attacks. Gaining detailed knowledge about them facilitates designing of new detection methods as well as understanding their impact. In this paper we present a testbed framework to simulate attacks that enables to study a wide range of security scenarios. The framework provides a notion of real-world arrangements, yet it retains full control over all the activities performed within the simulated infrastructures. Utilizing the sandbox environment, it is possible to simulate various security attacks and evaluate their impacts on real infrastructures. The design of the framework benefits from IaaS clouds. Therefore its deployment does not require dedicated facilities and the testbed can be deployed over miscellaneous contemporary clouds.
dcterms:title
Cloud-based Testbed for Simulation of Cyber Attacks Cloud-based Testbed for Simulation of Cyber Attacks
skos:prefLabel
Cloud-based Testbed for Simulation of Cyber Attacks Cloud-based Testbed for Simulation of Cyber Attacks
skos:notation
RIV/00216224:14610/14:00073216!RIV15-MV0-14610___
n3:aktivita
n13:P
n3:aktivity
P(VG20132015103)
n3:dodaniDat
n11:2015
n3:domaciTvurceVysledku
n8:5900522 n8:7585098 n8:7457634 n8:6968058 n8:6623697 n8:7935625 n8:5592925
n3:druhVysledku
n9:D
n3:duvernostUdaju
n18:S
n3:entitaPredkladatele
n5:predkladatel
n3:idSjednocenehoVysledku
7571
n3:idVysledku
RIV/00216224:14610/14:00073216
n3:jazykVysledku
n6:eng
n3:klicovaSlova
cyber attack; simulation; cloud; measurement; testbed; security; training
n3:klicoveSlovo
n4:testbed n4:security n4:training n4:cyber%20attack n4:measurement n4:simulation n4:cloud
n3:kontrolniKodProRIV
[5CF1CEEC3F49]
n3:mistoKonaniAkce
Krakow, Poland
n3:mistoVydani
Krakow, Poland
n3:nazevZdroje
Proceedings of the Network Operations and Management Symposium (NOMS 2014)
n3:obor
n7:IN
n3:pocetDomacichTvurcuVysledku
7
n3:pocetTvurcuVysledku
7
n3:projekt
n21:VG20132015103
n3:rokUplatneniVysledku
n11:2014
n3:tvurceVysledku
Vizváry, Martin Vykopal, Jan Kouřil, Daniel Rebok, Tomáš Jirsík, Tomáš Drašar, Martin Čegan, Jakub
n3:typAkce
n17:WRD
n3:zahajeniAkce
2014-01-01+01:00
s:numberOfPages
6
n15:doi
10.1109/NOMS.2014.6838298
n22:hasPublisher
IEEE Xplore Digital Library
n10:isbn
9781479909131
n16:organizacniJednotka
14610