Advertisement

A Simulated Infiltration Test for Network in Virtual Environment Using VMware Virtualization Technique

  • Guk-IL Kim
  • Jonghyeon Kim
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 474)

Abstract

Due to rapid development of IT technology, almost all things are being databased and as the value of information assets, the number of cyber attacks is increasing. Accordingly, the role of the white-hackers is becoming important, as well as their training. For the training, a simulated network infiltration test environment has been constructed in this study by using VMware’s virtualization technique to allow potential white-hackers to study the basics in networking area and some of the major attacking techniques which were actually put into the tests.

Keywords

Cyber attack VMware Information security Network security 

References

  1. 1.
    Kim, J.: Thermal Modeling of In-Situ Curing of Composite Cylinders Using Infrared Radiation. Ph.D thesis of Mechanical Systems & Design Area. Mechanical Engineering Department, University of Texas at Austin (1997)Google Scholar
  2. 2.
    Huh, J.-H., et al.: Implementation of DDoS botnet detection system on local area network. J. Korea Multimed. Soc. 16(6), 678–688 (2013). (In Korean)CrossRefGoogle Scholar
  3. 3.
    Huh, J.-H., Seo, K.: A case study of the base technology for the smart grid security: focusing on a performance improvement of the basic algorithm for the DDoS attacks detection using CUDA. J. Korea Multimed. Soc. 19(2), 411–417 (2016)CrossRefGoogle Scholar
  4. 4.
    Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. SERSC 9(2), 37–48 (2015)Google Scholar
  5. 5.
    Kajioka, S., Mori, T., Uchiya, T., Takumi, I., Matsuo, H.: Experiment of indoor position presumption based on RSSI of bluetooth LE beacon. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 337–339. IEEE (2014)Google Scholar
  6. 6.
    Huh, J.H.: Design and android application for monitoring system using PLC for ICT-Integrated Fish Farm, In: MUE 2016. LNEE, vol. 393, pp. 617–625 (2016)Google Scholar
  7. 7.
    Huang, H., Gartner, G., Schmidt, M., Li, Y.: Smart environment for ubiquitous indoor navigation. In: International Conference on New Trends in Information and Service Science, NISS 2009, pp. 176–180. IEEE (2009)Google Scholar
  8. 8.
    Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. 6(1), 1–21 (2016). Springer, Berlin HeidelbergCrossRefGoogle Scholar
  9. 9.
    Huh, J.H., Je, S.-M, Seo, K.: Communications-based technology for smart grid test bed using OPNET simulations. In: Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 227–233. Springer (2016)Google Scholar
  10. 10.
    Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5), 1862–1877 (2016). Springer, USACrossRefGoogle Scholar
  11. 11.
    Park, J., et al.: Design of the real-time mobile push system for implementation of the shipboard smart working. In: Advances in Computer Science and Ubiquitous Computing, (CUTE 2015). LNEE, vol. 373, pp. 541–548. Springer (2015)Google Scholar
  12. 12.
    Ueno, H., Hasegawa, S., Hasegawa, T.: Virtage: server virtualization with hardware transparency. Lecture Notes in Computer Science (LNCS), pp. 404–413. Springer, Berlin (2010)Google Scholar
  13. 13.
    Paessler, D.: Server virtualization and network management. Database Netw. J. 38(5), 13–16 (2008)Google Scholar
  14. 14.
    Taylor, C.: Consolidation server: how to enhance utilization of servers and storage. Manuf. Comput. Solut. 12(5), 26 (2006)Google Scholar
  15. 15.
    Botero, J.F., Hesselbach, X.: Greener networking in a network virtualization environment. Comput. Net. 57(9), 2021–2039 (2013)CrossRefGoogle Scholar
  16. 16.
    Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24–31 (2013)CrossRefGoogle Scholar
  17. 17.
    Zhao, G.Y., Tang, H.F., Xiao, L.M., Li, X.Q.: Efficient inline deduplication on VM images in desktop virtualization environment. Appl. Mech. Mater. 307, 488–493 (2013)CrossRefGoogle Scholar
  18. 18.
    Wang, X., Zhang, B., Luo, Y.: Optimizing interactive performance for desktop-virtualization environment. Lecture Notes in Computer Science (LNCS), vol. 7719, pp. 541–555. Springer, Berlin (2013)Google Scholar
  19. 19.
    Cohen, E., Paul, W., Schmaltz, S.: Theory of multi core hypervisor verification. Lecture Notes in Computer Science (LNCS), pp. 1–27. Springer, Berlin (2013)Google Scholar
  20. 20.
    Thorpe, S., Ray, I., Grandison, T., Barbir, A.: Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. Lecture Notes in Computer Science (LNCS), pp. 97–112. Springer, Berlin (2013)Google Scholar
  21. 21.
    Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1–19 (2017). Springer, HeidelbergMathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Graduate School of Information and Communication TechnologyAjou UniversitySuwonRepublic of Korea
  2. 2.Information and Communication TechnologyAjou UniversitySuwonRepublic of Korea

Personalised recommendations