{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:53:01Z","timestamp":1725954781945},"reference-count":66,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T00:00:00Z","timestamp":1508112000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["105\u20102218\u2010E\u2010001\u2010001","106\u20102221\u2010E\u2010006\u2010025"],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Communication"],"published-print":{"date-parts":[[2018,1,25]]},"abstract":"Summary<\/jats:title>As the internet continues to grow in width and depth, its very architecture brings many challenges in network research. One significant issue is cybersecurity. Owing to the characteristics of network connectivity, malicious actions may cause losses during information exchanges in communication. Therefore, studying suspicious behaviors and covering potential exploits are necessary to protect networked computers. To determine possible threats, researchers need an experimental environment that enables them to explore and practice. A network emulation testbed provides such a platform to fulfill these purposes. This paper introduces Testbed@TWISC, a large\u2010scale network emulation testbed on Taiwan's research and education network that supported open research and cybersecurity education for almost 10\u00a0years. The paper reviews this testbed's origination, development, and operation experiences. Several findings and open issues of the testbed are also discussed. Readers who plan to build network security testbeds may find useful information in this paper for a case study.<\/jats:p>","DOI":"10.1002\/dac.3446","type":"journal-article","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T23:22:40Z","timestamp":1508196160000},"source":"Crossref","is-referenced-by-count":10,"title":["Testbed@TWISC<\/scp>: A network security experiment platform"],"prefix":"10.1002","volume":"31","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0152-8603","authenticated-orcid":false,"given":"Pang\u2010Wei","family":"Tsai","sequence":"first","affiliation":[{"name":"Institute of Computer and Communication Engineering, Department of Electrical Engineering National Cheng Kung University Tainan Taiwan"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6461-7171","authenticated-orcid":false,"given":"Chu\u2010Sing","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Computer and Communication Engineering, Department of Electrical Engineering National Cheng Kung University Tainan Taiwan"}]}],"member":"311","published-online":{"date-parts":[[2017,10,16]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633059"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629607.1629613"},{"key":"e_1_2_7_4_1","volume-title":"Network Security: Private Communication in a Public World","author":"Kaufman C","year":"2002"},{"key":"e_1_2_7_5_1","doi-asserted-by":"crossref","unstructured":"VolynkinA SkorminV.Large\u2010scale reconfigurable virtual testbed for information security experiments. In Proceeding of International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities.2007:1\u20109.","DOI":"10.1109\/TRIDENTCOM.2007.4444663"},{"key":"e_1_2_7_6_1","first-page":"255","article-title":"An integrated experimental environment for distributed systems and networks","volume":"36","author":"White B","year":"2002","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"e_1_2_7_7_1","unstructured":"Testbed at TaiWan Information Security Center. [Online]. Available:https:\/\/www.testbed.ncku.edu.tw\/. Accessed June 14 2017"},{"key":"e_1_2_7_8_1","unstructured":"LaihC\u2010S LiJ\u2010S LinM\u2010J et al.Development and operation of Testbed@TWISC. In Proceeding of Joint Workshop on Information Security.2008:532\u2010546."},{"issue":"2","key":"e_1_2_7_9_1","first-page":"8","article-title":"Teaching hands\u2010on network security: testbeds and live exercises","volume":"3","author":"Vigna G","year":"2003","journal-title":"J Inf Warfare"},{"key":"e_1_2_7_10_1","doi-asserted-by":"crossref","unstructured":"BenzelT BradenR KimD et al.Experience with DETER: a testbed for security research. In Proceeding of International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities 2006.","DOI":"10.1109\/TRIDNT.2006.1649172"},{"issue":"4","key":"e_1_2_7_11_1","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1016\/j.cose.2006.11.005","article-title":"Teaching information systems security courses: a hands\u2010on approach","volume":"26","author":"Sharma SK","year":"2007","journal-title":"Comput Secur"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.037"},{"key":"e_1_2_7_13_1","doi-asserted-by":"crossref","DOI":"10.1201\/b13256","volume-title":"Introduction to network emulation","author":"Beuran R","year":"2012"},{"key":"e_1_2_7_14_1","article-title":"A stance on emulation and testbeds, and a survey of network emulators and testbeds","author":"G\u00f6kt\u00fcrk E","year":"2007","journal-title":"Proc ECMS"},{"key":"e_1_2_7_15_1","unstructured":"PanJ JainR.A survey of network simulation tools: current status and future developments. Washington University in St. Louis Tech. Rep;2008."},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5936152"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.12.034"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.111"},{"key":"e_1_2_7_19_1","doi-asserted-by":"crossref","unstructured":"HandigolN HellerB JeyakumarV LantzB McKeownN.Reproducible network experiments using container\u2010based emulation. In Proceedings of the ACM International Conference on Emerging Networking Experiments and Technologies 2012:253\u2010264.","DOI":"10.1145\/2413176.2413206"},{"key":"e_1_2_7_20_1","unstructured":"JamshidiM.System\u2010of\u2010systems engineering\u2010a definition. In Proceeding of the IEEE International Conference on Systems Man and Cybernetics 2005:10\u201012."},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.007"},{"key":"e_1_2_7_22_1","unstructured":"HiblerM RicciR StollerL et al.Large\u2010scale virtualization in the Emulab network testbed. In Proceeding of USENIX Annual Technical Conference USENIX Association Berkeley CA USA 2008:113\u2010128."},{"issue":"4","key":"e_1_2_7_23_1","first-page":"1615","article-title":"The DETER project: towards structural advances in experimental cybersecurity research and evaluation","volume":"7","author":"Benzel T","year":"2012","journal-title":"Inf Media Technol"},{"key":"e_1_2_7_24_1","unstructured":"FaberT WroclawskiJ LaheyK.A DETER federation architecture. In Proceeding of DETER 2007."},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-319-33769-2_3","volume-title":"The GENI Book","author":"Wroclawski J","year":"2016"},{"key":"e_1_2_7_26_1","doi-asserted-by":"crossref","unstructured":"DolgikhA NykodymT SkorminV AntonakosJ.Computer network testbed at Binghamton University. In Proceedings of Military Communications Conference 2011:1146\u20101151.","DOI":"10.1109\/MILCOM.2011.6127454"},{"key":"e_1_2_7_27_1","unstructured":"KREONET testbed service. [Online]. Available:https:\/\/www.emulab.kreonet.net\/. Accessed June 14 2017"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2014.01.002"},{"key":"e_1_2_7_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945462"},{"key":"e_1_2_7_30_1","unstructured":"SherwoodR GibbG YapK\u2010K et al.FlowVisor: a network virtualization layer. OpenFlow Switch Consortium Tech. Rep 2009."},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_2_7_32_1","unstructured":"R.Ricci E.Eide andC.Team.Introducing CloudLab: scientific infrastructure for advancing cloud architectures and applications. The magazine of USENIX & SAGE.2014;39(6):36\u201038 ."},{"key":"e_1_2_7_33_1","unstructured":"Internet 2. [Online]. Available:http:\/\/www.internet2.edu\/vision\u2010initiatives\/initiatives\/innovation\u2010platform\/. Accessed June 14 2017"},{"key":"e_1_2_7_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"e_1_2_7_35_1","unstructured":"DaneelsA SalterW.What is SCADA?1999."},{"key":"e_1_2_7_36_1","doi-asserted-by":"crossref","unstructured":"HahnA KregelB GovindarasuM FitzpatrickJ AdnanR SridharS HigdonM.Development of the PowerCyber SCADA security testbed. In Proceedings of the ACM Annual Workshop on Cyber Security and Information Intelligence Research 2010.","DOI":"10.1145\/1852666.1852690"},{"key":"e_1_2_7_37_1","unstructured":"TaiWan Information Security Center. [Online]. Available:https:\/\/www.twisc.org\/. Accessed June 14 2017"},{"key":"e_1_2_7_38_1","unstructured":"National Center for High\u2010performance Computing. [Online]. Available:https:\/\/www.nchc.org.tw\/. Accessed June 14 2017"},{"key":"e_1_2_7_39_1","unstructured":"ChenL\u2010D.Construction of the new generation network security testbed\u2014Testbed@TWISC: integration and implementation on software aspect. Master's thesis National Cheng Kung University 2008. [Online]. Available:http:\/\/handle.ncl.edu.tw\/11296\/ndltd\/94095022514767478414. Accessed June 14 2017"},{"key":"e_1_2_7_40_1","doi-asserted-by":"crossref","unstructured":"TsaiP\u2010W FongW\u2010H HuangK\u2010W LuoM\u2010Y YangC\u2010S.Design and development of virtual nodes in the network testbed for emulation. In Proceeding of the IEEE Pacific Rim Conference on Communications Computers and Signal Processing 2015:101\u2010106.","DOI":"10.1109\/PACRIM.2015.7334817"},{"key":"e_1_2_7_41_1","first-page":"1","article-title":"Planning and implantation of NetFPGA platform on network emulation testbed","volume":"32","author":"Tsai P\u2010W","year":"2011","journal-title":"Proc Asia Pac Adv Netw"},{"key":"e_1_2_7_42_1","unstructured":"Emulab git repository. [Online]. Available:https:\/\/wiki.emulab.net\/wiki\/GitRepository. Accessed June 14 2017"},{"key":"e_1_2_7_43_1","unstructured":"Testbed@TWISC Monitor (T@T Monitor). [Online]. Available:https:\/\/www.testbed.ncku.edu.tw\/docwrapper.php3?docname=download.html. Accessed June 14 2017"},{"key":"e_1_2_7_44_1","volume-title":"Department of Energy Computer Incident Advisory Capability","author":"Criscuolo PJ","year":"2000"},{"key":"e_1_2_7_45_1","unstructured":"Thc hydra. [Online]. Available:http:\/\/sectools.org\/tool\/hydra\/. Accessed June 14 2017"},{"key":"e_1_2_7_46_1","unstructured":"Threadtrack GFI sandbox. [Online]. Available:https:\/\/www.threattrack.com\/malware\u2010analysis.aspx. Accessed June 14 2017"},{"key":"e_1_2_7_47_1","first-page":"43","article-title":"A novel way to generate the rule patterns for detecting malicious PDF documents","volume":"40","author":"Kuo C\u2010C","year":"2015","journal-title":"Proc Asia Pac Adv Netw"},{"key":"e_1_2_7_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/nem.1923"},{"key":"e_1_2_7_49_1","doi-asserted-by":"crossref","unstructured":"HermenierF RicciR.How to build a better testbed: lessons from a decade of network experiments on Emulab. In Proceedings of International ICST Conference on Testbeds and Research Infrastructures 2012:287\u2010304.","DOI":"10.1007\/978-3-642-35576-9_24"},{"key":"e_1_2_7_50_1","unstructured":"TsaiP\u2010W LaiY\u2010T ChengP\u2010W YangC\u2010S LuoM\u2010Y.Design and develop an OpenFlow testbed within virtualized architecture. In Proceedings of Asia\u2010Pacific Network Operations and Management Symposium 2013:1\u20103."},{"key":"e_1_2_7_51_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2607"},{"key":"e_1_2_7_52_1","volume-title":"RESTful Web Services","author":"Richardson L","year":"2008"},{"key":"e_1_2_7_53_1","unstructured":"Emulab node availability stats. [Online]. Available:https:\/\/www.emulab.net\/node_usage\/. Accessed June 14 2017"},{"key":"e_1_2_7_54_1","unstructured":"Cacti the complete rrdtool\u2010based graphing solution. [Online]. Available:http:\/\/www.cacti.net\/. Accessed June 14 2017"},{"key":"e_1_2_7_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"e_1_2_7_56_1","unstructured":"Ryu. [Online]. Available:https:\/\/osrg.github.io\/ryu\/. Accessed June 14 2017"},{"key":"e_1_2_7_57_1","unstructured":"Next\u2010gen infrastructure security report.2016. [Online]. Available:https:\/\/www.sdxcentral.com\/articles\/announcements\/next\u2010gen\u2010infrastructure\u2010security\u2010report\u2010available\/2016\/05\/. Accessed June 14 2017"},{"key":"e_1_2_7_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2013.10.004"},{"issue":"6","key":"e_1_2_7_59_1","first-page":"97","article-title":"A survey on resource allocation strategies in cloud computing","volume":"3","author":"Vinothina V","year":"2012","journal-title":"Int J Adv Comput Sci Appl"},{"key":"e_1_2_7_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.03.024"},{"key":"e_1_2_7_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.11.005"},{"key":"e_1_2_7_62_1","doi-asserted-by":"crossref","unstructured":"RicciR WongG StollerL et al.Apt: A Platform for Repeatable Research in Computer Science. In Proceeding of ACM SIGOPS Operating Systems Review 2015;49(1):100\u2010107.","DOI":"10.1145\/2723872.2723885"},{"key":"e_1_2_7_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.017"},{"key":"e_1_2_7_64_1","unstructured":"MizrahiT MosesY.Time4: time for SDN. arXiv preprint arXiv:1505.03421 2015."},{"key":"e_1_2_7_65_1","unstructured":"SchwabS WilsonB KoC HussainA.SEER: a security experimentation environment for deter. In Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test 2007."},{"key":"e_1_2_7_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.2373"},{"key":"e_1_2_7_67_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.729"}],"container-title":["International Journal of Communication Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fdac.3446","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/dac.3446","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T08:33:32Z","timestamp":1695976412000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/dac.3446"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,16]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,1,25]]}},"alternative-id":["10.1002\/dac.3446"],"URL":"https:\/\/doi.org\/10.1002\/dac.3446","archive":["Portico"],"relation":{},"ISSN":["1074-5351","1099-1131"],"issn-type":[{"value":"1074-5351","type":"print"},{"value":"1099-1131","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,16]]}}}