Cyber attack and defense training: Using emulab as a platform

IF 1.3 Q4 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE International Journal of Innovative Computing Information and Control Pub Date : 2018-12-01 DOI:10.24507/IJICIC.14.06.2245
C. Kuo, Kai Chain, Chu-Sing Yang
{"title":"Cyber attack and defense training: Using emulab as a platform","authors":"C. Kuo, Kai Chain, Chu-Sing Yang","doi":"10.24507/IJICIC.14.06.2245","DOIUrl":null,"url":null,"abstract":". Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intru-sions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"54 1","pages":"2245-2258"},"PeriodicalIF":1.3000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Innovative Computing Information and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24507/IJICIC.14.06.2245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 5

Abstract

. Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intru-sions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络攻击与防御训练:以模拟器为平台
. 虽然互联网的便利性改变了当代社会、生活方式和人际交往,但它也使各种网络入侵成为可能,这些入侵试图通过操纵互联网功能、计算机、软件或用户的社会弱点来攫取名誉或利益。攻击者利用新技术并开发了新技术来部署无尽的战术和技能。然而,传统的网络安全教育往往依赖于课堂教学,而不是使用真实的机器进行实际任务,因为实际的机器实践往往会引发攻击或异常的网络流量。本文使用Emulab作为测试平台,提供了一个可控的环境,支持快速部署、调整和测量进攻性和防御性网络安全实验。本文通过对预定场景下网络攻防演习的整合,以及相关的网络安全问题,编制了演习参与者的行动和反应数据。这使得分析和改进攻击和防御机动、场景和平台成为可能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
3.20
自引率
20.00%
发文量
0
审稿时长
4.3 months
期刊介绍: The primary aim of the International Journal of Innovative Computing, Information and Control (IJICIC) is to publish high-quality papers of new developments and trends, novel techniques and approaches, innovative methodologies and technologies on the theory and applications of intelligent systems, information and control. The IJICIC is a peer-reviewed English language journal and is published bimonthly
期刊最新文献
A Robust Image Encryption Scheme Based on Block Compressive Sensing and Wavelet Transform New Proposed Mixed Transforms: CAW and FAW and Their Application in Medical Image Classification A Hybrid Multiwavelet Transform with Grey Wolf Optimization Used for an Efficient Classification of Documents A Useful and Effective Method for Selecting a Smart Controller for SDN Network Design and Implement Fast Dust Sand Image Enhancement Based on Color Correction and New Fuzzy Intensification Operators
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1