Skip to main content

A Simulated Infiltration Test for Network in Virtual Environment Using VMware Virtualization Technique

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (CUTE 2017, CSA 2017)

Abstract

Due to rapid development of IT technology, almost all things are being databased and as the value of information assets, the number of cyber attacks is increasing. Accordingly, the role of the white-hackers is becoming important, as well as their training. For the training, a simulated network infiltration test environment has been constructed in this study by using VMware’s virtualization technique to allow potential white-hackers to study the basics in networking area and some of the major attacking techniques which were actually put into the tests.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kim, J.: Thermal Modeling of In-Situ Curing of Composite Cylinders Using Infrared Radiation. Ph.D thesis of Mechanical Systems & Design Area. Mechanical Engineering Department, University of Texas at Austin (1997)

    Google Scholar 

  2. Huh, J.-H., et al.: Implementation of DDoS botnet detection system on local area network. J. Korea Multimed. Soc. 16(6), 678–688 (2013). (In Korean)

    Article  Google Scholar 

  3. Huh, J.-H., Seo, K.: A case study of the base technology for the smart grid security: focusing on a performance improvement of the basic algorithm for the DDoS attacks detection using CUDA. J. Korea Multimed. Soc. 19(2), 411–417 (2016)

    Article  Google Scholar 

  4. Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. SERSC 9(2), 37–48 (2015)

    Google Scholar 

  5. Kajioka, S., Mori, T., Uchiya, T., Takumi, I., Matsuo, H.: Experiment of indoor position presumption based on RSSI of bluetooth LE beacon. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 337–339. IEEE (2014)

    Google Scholar 

  6. Huh, J.H.: Design and android application for monitoring system using PLC for ICT-Integrated Fish Farm, In: MUE 2016. LNEE, vol. 393, pp. 617–625 (2016)

    Google Scholar 

  7. Huang, H., Gartner, G., Schmidt, M., Li, Y.: Smart environment for ubiquitous indoor navigation. In: International Conference on New Trends in Information and Service Science, NISS 2009, pp. 176–180. IEEE (2009)

    Google Scholar 

  8. Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. 6(1), 1–21 (2016). Springer, Berlin Heidelberg

    Article  Google Scholar 

  9. Huh, J.H., Je, S.-M, Seo, K.: Communications-based technology for smart grid test bed using OPNET simulations. In: Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 227–233. Springer (2016)

    Google Scholar 

  10. Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5), 1862–1877 (2016). Springer, USA

    Article  Google Scholar 

  11. Park, J., et al.: Design of the real-time mobile push system for implementation of the shipboard smart working. In: Advances in Computer Science and Ubiquitous Computing, (CUTE 2015). LNEE, vol. 373, pp. 541–548. Springer (2015)

    Google Scholar 

  12. Ueno, H., Hasegawa, S., Hasegawa, T.: Virtage: server virtualization with hardware transparency. Lecture Notes in Computer Science (LNCS), pp. 404–413. Springer, Berlin (2010)

    Google Scholar 

  13. Paessler, D.: Server virtualization and network management. Database Netw. J. 38(5), 13–16 (2008)

    Google Scholar 

  14. Taylor, C.: Consolidation server: how to enhance utilization of servers and storage. Manuf. Comput. Solut. 12(5), 26 (2006)

    Google Scholar 

  15. Botero, J.F., Hesselbach, X.: Greener networking in a network virtualization environment. Comput. Net. 57(9), 2021–2039 (2013)

    Article  Google Scholar 

  16. Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24–31 (2013)

    Article  Google Scholar 

  17. Zhao, G.Y., Tang, H.F., Xiao, L.M., Li, X.Q.: Efficient inline deduplication on VM images in desktop virtualization environment. Appl. Mech. Mater. 307, 488–493 (2013)

    Article  Google Scholar 

  18. Wang, X., Zhang, B., Luo, Y.: Optimizing interactive performance for desktop-virtualization environment. Lecture Notes in Computer Science (LNCS), vol. 7719, pp. 541–555. Springer, Berlin (2013)

    Google Scholar 

  19. Cohen, E., Paul, W., Schmaltz, S.: Theory of multi core hypervisor verification. Lecture Notes in Computer Science (LNCS), pp. 1–27. Springer, Berlin (2013)

    Google Scholar 

  20. Thorpe, S., Ray, I., Grandison, T., Barbir, A.: Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. Lecture Notes in Computer Science (LNCS), pp. 97–112. Springer, Berlin (2013)

    Google Scholar 

  21. Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1–19 (2017). Springer, Heidelberg

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jonghyeon Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, GI., Kim, J. (2018). A Simulated Infiltration Test for Network in Virtual Environment Using VMware Virtualization Technique. In: Park, J., Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in Electrical Engineering, vol 474. Springer, Singapore. https://doi.org/10.1007/978-981-10-7605-3_34

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7605-3_34

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7604-6

  • Online ISBN: 978-981-10-7605-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics