SUCCESS lab research data/program
release:
(Disclaimer: Use the prototype and data for academic purposes only and at your own risk.)
- TopoGuard: A newsecurity extension to SDN controllers (Floodlight
as in our prototype implementation), which provides automatic and
real-time detection of Network Topology Poisoning Attacks. The source
code is available here.
Citations:
- Sungmin Hong*,
Lei Xu*, Haopei Wang, Guofei Gu. "Poisoning Network Visibility in
Software-Defined Networks: New Attacks and Countermeasures." In Proc. of 22nd Annual
Network & Distributed System Security Symposium (NDSS'15),
San Diego, CA, USA. February 2015. (*co-first author)
- Our improved and extended version of FortNOX (in HotSDN'12) for
Floodlight OpenFlow Controller is now released (with the new name
SE-Floodlight)! Together with SE-Floodlight, we also have two add-on
security tools: SDN Security Actuator and OF-BotHunter. They are cool
and try them out! This is joint effort with SRI International. Please
check out more information here!
Citations:
- Phillip Porras, Seungwon Shin, Vinod Yegneswaran,
Martin Fong, Mabry Tyson, and Guofei Gu. "A Security Enforcement Kernel
for OpenFlow Networks." To appear in Proc. of ACM SIGCOMM Workshop on
Hot Topics in Software Defined Networking (HotSDN'12), Helsinki,
Finland. August 2012.[ pdf] [bib]
- A sample dataset of 1K malicious spammers and 10K normal
users on Twitter (as described in our RAID'11 and WWW'12 paper). Due to
several constraints (privacy/protection), we are not posting the
dataset directly here. Please contact me to obtain the data for your
research.
Citations:
- Chao Yang, Robert Harkreader, Jialong Zhang, Suengwon Shin,
and Guofei Gu. "Analyzing Spammers' Social Networks For Fun and Profit
-- A Case Study of Cyber Criminal Ecosystem on Twitter." In Proceedings
of the 21st International World Wide Web Conference (WWW'12), Lyon,
France, April 2012. [pdf] [bib]
- Chao Yang, Robert Harkreader, Guofei Gu. "Die Free or Live
Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter
Spammers." In Proceedings of the 14th International Symposium on Recent
Advances in Intrusion Detection (RAID 2011), Menlo Park, California,
September 2011. [pdf] [bib]
- Malicious social network graph structure: It contains the
inner
social relationships among 2,060 identified malicious spammer
accounts (as described in our WWW'12 paper). It is available
for downloading here.
The description of the data format is in ReadMe.txt.
Citation:
- Chao Yang, Robert Harkreader, Jialong Zhang, Suengwon Shin, and Guofei
Gu. "Analyzing Spammers' Social Networks For Fun and Profit -- A Case
Study of Cyber Criminal Ecosystem on Twitter." In Proceedings of the
21st International World Wide Web Conference (WWW'12), Lyon, France,
April 2012. [pdf] [bib]
- New release of BotHunter!
Now
support Linux/Mac/Windows XP! A live-CD distribution also available!
Citation:
- Guofei Gu, Phillip Porras, Vinod
Yegneswaran, Martin Fong, and Wenke Lee. "BotHunter: Detecting Malware
Infection Through IDS-Driven Dialog Correlation." In Proceedings
of the 16th USENIX Security Symposium (Security'07), Boston,
MA, August 2007. [pdf] [bib]
Prototype Academic License
Permission is hereby granted, free of charge, to any person obtaining a
copy of this software and associated documentation files (the
"Software"), to a non-exclusive, nontransferable, perpetual license to
the copy, modify and perform the Software for non-profit academic
research purposes. Use of the Software is restricted to non-commercial
research purposes.
The Software may be additionally covered by one or more domestic and
international patents or pending patent applications. If you wish to
use the Software for any other purpose, you are responsible to
determine if a patent license is needed and obtain such a license.
The above copyright notice and this permission notice shall be included
in all copies, modifications or substantial portions of the Software.
If utilization of the Software (or data) results in outcomes which will
be published, you agree to cite the developers in the publication.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.