@conference {62, title = {Goliath: A Configurable Approach for Network Testing}, booktitle = {Testbeds and Research Infrastructure for the Development of Networks and Communities, 2007. TridentCom 2007. 3rd International Conference on}, year = {2007}, month = {May}, abstract = {

When testing a network environment and/or application many aspects need to be taken into consideration. For example, different software needs to be deployed at different nodes and different topologies may also need to be tested. The manual execution of these tasks are very time consuming and a configurable environment to facilitate these tasks and consequently improve testing performance is desired. In this paper a virtual network environment that can be easily reconfigured is presented to address this problem. Also presented is a case study with the results of deployment and containing a worm propagation attack.

}, keywords = {automated network testing, Computational modeling, computer networks, Computer science, Computer worms, Distributed computing, Goliath, Intrusion detection, network topologies, Network topology, Protocols, security of data, Software testing, System testing, telecommunication computing, telecommunication network topology, telecommunication security, virtual network environment, virtual private networks, worm propagation attack}, doi = {10.1109/TRIDENTCOM.2007.4444667}, author = {Fagen, Wade and Cangussu, Jo{\~a}o and Ram Dantu} }