01749nas a2200373 4500008004100000245005700041210005600098260000800154520063400162653003000796653002700826653002200853653002100875653001900896653002600915653001200941653002400953653002300977653002101000653001401021653002101035653002101056653001901077653003201096653003901128653003101167653003201198653002901230653002801259100001601287700002001303700001501323856003701338 2007 eng d00aGoliath: A Configurable Approach for Network Testing0 aGoliath A Configurable Approach for Network Testing cMay3 a
When testing a network environment and/or application many aspects need to be taken into consideration. For example, different software needs to be deployed at different nodes and different topologies may also need to be tested. The manual execution of these tasks are very time consuming and a configurable environment to facilitate these tasks and consequently improve testing performance is desired. In this paper a virtual network environment that can be easily reconfigured is presented to address this problem. Also presented is a case study with the results of deployment and containing a worm propagation attack.
10aautomated network testing10aComputational modeling10acomputer networks10aComputer science10aComputer worms10aDistributed computing10aGoliath10aIntrusion detection10anetwork topologies10aNetwork topology10aProtocols10asecurity of data10aSoftware testing10aSystem testing10atelecommunication computing10atelecommunication network topology10atelecommunication security10avirtual network environment10avirtual private networks10aworm propagation attack1 aFagen, Wade1 aCangussu, João1 aDantu, Ram uhttps://nsl.cse.unt.edu/node/231