Remote Virtual Information Assurance Network

  • Ronald C Dodge
  • Corey Bertram
  • Daniel Ragsdale
Part of the IFIP International Federation for Information Processing book series (IFIPAICT, volume 232)


The use of virtualization technologies to increase the capacity and utilization of laboratory resources is widely used in classroom environments using several workstation based virtualization products. These virtual networks are often “air gapped” to prevent the inadvertent release of malware. This implementation however requires users to be in the classroom. A novel extension on this concept is to design the infrastructure to support remote access to the virtual machine(s) using virtual server applications, while maintaining the complete isolation of the virtual networks.


Virtual Machine External Network Virtual Network Virtual Server Virtual Infrastructure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    M. Rosenblum, “The Reincarnation of Virtual Machines,” ACM Queue, Vol. 2 No. 5 — July/August 2004.Google Scholar
  2. 2.
    B. Supnik, “Simulators: Virtual Machines of the Past (and Future)”, ACM Queue, Vol. 2 No. 5 — July/August 2004.Google Scholar
  3. 3.
    Cynthia E. Irvine, “Amplifying Security Education in the Laboratory,” Proceedings IFIP TCI 1 WC 11.8 First World Conference on Information Security Education, pp 139–146, Kista, Sweden, June 1999.Google Scholar
  4. 4.
    D. J. Ragsdale, S. D. Lathrop, and R. C. Dodge,“ Enhancing Information Warfare Education Through the Use of Virtual and Isolated Networks,” The Journal of Information Warfare, Volume 2, Issue 3, pp. 47–59 August 2003.Google Scholar
  5. 5.
    B. Hay and K. Nance, “Evolution of the ASSERT Computer Security Lab,” Proceedings of the 10th Colloquium for Information Systems Security Education, page 150–156, Adelphi MD, June 5-8, 2006.Google Scholar
  6. 6.
    V. Padman and N. Memon, “Design of a Virtual Laboratory for Information Assurance Education and Research,” Proceedings of the 5th IEEE Information Assurance Workshop, West Point, NY, 17-19 June 2002.Google Scholar
  7. 7.
    J. Hu, D. Cordel, and C. Meinel, “A Virtual Laboratory for IT Security Education,” Proceedings of the Conference on Information Systems in E-Business and EGovernment (EMISA), pp. 60–67, Luxembourg, 6-8 Oct 20041.Google Scholar
  8. 8.
    E. Damiani, F. Frati, and D. Rebeccani, “The Open Source Virtual Lab: a Case Study,” Workshop on Free and open Cource Learning Environments and Tools, Como, Italy, 10 June 2006.Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Ronald C Dodge
    • 1
  • Corey Bertram
    • 2
  • Daniel Ragsdale
    • 3
  1. 1.Department of Electrical EngineerigUnited States Military AcademyWest Point
  2. 2.George Washington UniverstiyWashington DC
  3. 3.Computer ScienceUnited States Military AcademyWest Point

Personalised recommendations