A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to 'worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.

Original languageEnglish (US)
Title of host publication2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013
PublisherIEEE Computer Society
Pages516-523
Number of pages8
ISBN (Print)9781908320209
DOIs
StatePublished - 2013
Event2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013 - Yangzhou, Jiangsu, China
Duration: Mar 23 2013Mar 25 2013

Other

Other2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013
CountryChina
CityYangzhou, Jiangsu
Period3/23/133/25/13

Fingerprint

Testbeds
Telecommunication networks
Information systems
Innovation
Availability
Specifications
Communication
Industry
Experiments

Keywords

  • cloud computing
  • cyber-attacks
  • Edgeware
  • grid computing
  • hacking
  • virtualization
  • vulnerabilities
  • wireless grids
  • workplace-as-a-service

ASJC Scopus subject areas

  • Information Systems

Cite this

Brooks, T., Kaarst-Brown, M. L., Caicedo Bastidas, C. E., Park, J. S., & McKnight, L. W. (2013). A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application. In 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013 (pp. 516-523). [6750254] IEEE Computer Society. https://doi.org/10.1109/ICITST.2013.6750254

A failure to communicate : Security vulnerabilities in the GridStreamX Edgeware application. / Brooks, Tyson; Kaarst-Brown, Michelle L; Caicedo Bastidas, Carlos Enrique; Park, Joon S; McKnight, Lee W.

2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013. IEEE Computer Society, 2013. p. 516-523 6750254.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Brooks, T, Kaarst-Brown, ML, Caicedo Bastidas, CE, Park, JS & McKnight, LW 2013, A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application. in 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013., 6750254, IEEE Computer Society, pp. 516-523, 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, Yangzhou, Jiangsu, China, 3/23/13. https://doi.org/10.1109/ICITST.2013.6750254
Brooks T, Kaarst-Brown ML, Caicedo Bastidas CE, Park JS, McKnight LW. A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application. In 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013. IEEE Computer Society. 2013. p. 516-523. 6750254 https://doi.org/10.1109/ICITST.2013.6750254
Brooks, Tyson ; Kaarst-Brown, Michelle L ; Caicedo Bastidas, Carlos Enrique ; Park, Joon S ; McKnight, Lee W. / A failure to communicate : Security vulnerabilities in the GridStreamX Edgeware application. 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013. IEEE Computer Society, 2013. pp. 516-523
@inproceedings{27d745ba09c548bd9ad3f92936d574d9,
title = "A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application",
abstract = "Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to 'worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.",
keywords = "cloud computing, cyber-attacks, Edgeware, grid computing, hacking, virtualization, vulnerabilities, wireless grids, workplace-as-a-service",
author = "Tyson Brooks and Kaarst-Brown, {Michelle L} and {Caicedo Bastidas}, {Carlos Enrique} and Park, {Joon S} and McKnight, {Lee W}",
year = "2013",
doi = "10.1109/ICITST.2013.6750254",
language = "English (US)",
isbn = "9781908320209",
pages = "516--523",
booktitle = "2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013",
publisher = "IEEE Computer Society",
address = "United States",

}

TY - GEN

T1 - A failure to communicate

T2 - Security vulnerabilities in the GridStreamX Edgeware application

AU - Brooks, Tyson

AU - Kaarst-Brown, Michelle L

AU - Caicedo Bastidas, Carlos Enrique

AU - Park, Joon S

AU - McKnight, Lee W

PY - 2013

Y1 - 2013

N2 - Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to 'worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.

AB - Any communications network is subject to becoming the target of exploitation by criminal hackers looking to gain unauthorized access to an information system. As a computer information infrastructure, the wireless grid Edgeware technology model aims at aggregating ensembles of shared, heterogeneous and distributed wireless resources to provide transparent services of various applications, systems and devices. Currently, there is no research exploring the exploitation of technical vulnerabilities from a hacker's attack against a wireless grid Edgeware application. Using a quantitative research method from the theoretical perspective of an anatomy of a network attack, the central premise of this article is to compromise the confidentiality, integrity and availability of a wireless grid called the GridStreamX Edgeware application for vulnerability exploitation through a laboratory experiment within the Syracuse University Wireless Grid Innovation Testbed (WiGiT). The GridStreamX Edgeware application is cloud to 'worst case scenario' emergency response wireless Grid resource, which can be utilized as a data communication vehicle during an enterprise network catastrophe and/or failure. This research makes a meaningful theoretical and managerial contribution because it represents the first empirical examination of researching the technical requirements of the open specifications for wireless grid Edgeware technology.

KW - cloud computing

KW - cyber-attacks

KW - Edgeware

KW - grid computing

KW - hacking

KW - virtualization

KW - vulnerabilities

KW - wireless grids

KW - workplace-as-a-service

UR - http://www.scopus.com/inward/record.url?scp=84896640786&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84896640786&partnerID=8YFLogxK

U2 - 10.1109/ICITST.2013.6750254

DO - 10.1109/ICITST.2013.6750254

M3 - Conference contribution

AN - SCOPUS:84896640786

SN - 9781908320209

SP - 516

EP - 523

BT - 2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013

PB - IEEE Computer Society

ER -