Table 2 Experimental testbed specifications and descriptions.
From: Brute-force attack mitigation on remote access services via software-defined perimeter
Component | Software stack | Hardware allocation | Role description |
|---|---|---|---|
Host Machine | Ubuntu Linux 20.04 LTS, Docker Engine | Intel Core i7-7700HQ @ 2.80 GHz (8 MB Cache), 16 GB DDR4 RAM, NVIDIA GTX 1050 4 GB GDDR5, 1.0 Gbps Ethernet | Host platform for all containers |
Container 1 | Ubuntu Linux 20.04 LTS, Waverley SDP Controller Module | 1 vCPU, 2 GB RAM, 2 NICs | Runs SDP Controller |
Container 2 | Ubuntu Linux 20.04 LTS, fwknop (AH configuration), RAS Services | 1 vCPU, 2 GB RAM, 3 NICs | Acts as SDP Gateway with iptables firewall |
Container 3 | Kali Linux, Attack Scripts | 1 vCPU, 1 GB RAM, 1 NIC | Simulates BFA and DoS attack scenarios |
Container 4 | Ubuntu Linux 20.04 LTS, fwknop (IH configuration) | 1 vCPU, 1 GB RAM, 1 NIC | Emulates legitimate client using SPA authentication |