{"title":"作为评估单位的网络包分析:识别表情符号","authors":"J. Allison","doi":"10.1145/3564721.3565952","DOIUrl":null,"url":null,"abstract":"Cyber security is growing in importance globally and network forensics is an important component of a cyber security curriculum. Wireshark is a common tool used for the analysis of network traffic but it is seldom documented in academic literature how packet analysis is used in the teaching and learning within cyber security courses. In this poster, the practice of using Wireshark and the analysis of network traffic is documented with details about how packet analysis was used as an assessment approach, where students were required to identify the malware of Emotet, and its associated network traffic behaviour. Our ongoing and future work include implementing and evaluating the approach of using packet analysis as a form of assessment, with the aim of this poster to elicit feedback from conference participants on the practice itself, and how it can be used to ensure effective student learning.","PeriodicalId":149708,"journal":{"name":"Proceedings of the 22nd Koli Calling International Conference on Computing Education Research","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Packet Analysis as a Unit of Assessment: Identifying Emotet\",\"authors\":\"J. Allison\",\"doi\":\"10.1145/3564721.3565952\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber security is growing in importance globally and network forensics is an important component of a cyber security curriculum. Wireshark is a common tool used for the analysis of network traffic but it is seldom documented in academic literature how packet analysis is used in the teaching and learning within cyber security courses. In this poster, the practice of using Wireshark and the analysis of network traffic is documented with details about how packet analysis was used as an assessment approach, where students were required to identify the malware of Emotet, and its associated network traffic behaviour. Our ongoing and future work include implementing and evaluating the approach of using packet analysis as a form of assessment, with the aim of this poster to elicit feedback from conference participants on the practice itself, and how it can be used to ensure effective student learning.\",\"PeriodicalId\":149708,\"journal\":{\"name\":\"Proceedings of the 22nd Koli Calling International Conference on Computing Education Research\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 22nd Koli Calling International Conference on Computing Education Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3564721.3565952\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 22nd Koli Calling International Conference on Computing Education Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3564721.3565952","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Packet Analysis as a Unit of Assessment: Identifying Emotet
Cyber security is growing in importance globally and network forensics is an important component of a cyber security curriculum. Wireshark is a common tool used for the analysis of network traffic but it is seldom documented in academic literature how packet analysis is used in the teaching and learning within cyber security courses. In this poster, the practice of using Wireshark and the analysis of network traffic is documented with details about how packet analysis was used as an assessment approach, where students were required to identify the malware of Emotet, and its associated network traffic behaviour. Our ongoing and future work include implementing and evaluating the approach of using packet analysis as a form of assessment, with the aim of this poster to elicit feedback from conference participants on the practice itself, and how it can be used to ensure effective student learning.