Remotely Accessible Exercise Environment for Intrusion Detection/Defense Exercises Based on Virtual Machine Networks
Network security exercises carried out in laboratories have limitations of time and place. Students cannot exercise during their free time and outside the campus. Furthermore, teaching attack skills to students raises the issue of maintaining ethical standards. We have developed LiNeS (Linux Network Simulator) that generates networks for network administration exercises by using virtual machines; such a network is called a virtual machine network. In this study, we realize a virtual machine network in which attacks are generated automatically in a remotely accessible exercise environment by using LiNeS. Our system can resolve the abovementioned problems because students can completely focus on intrusion detection/defense via PCs connected to the Internet.
KeywordsVirtual Machine System Information Execution Environment Presentation Function Exercise Environment
Unable to display preview. Download preview PDF.
- 1.Harris, J.: Maintaining ethical standards for a computer security curriculum. In: Proceedings of the 1st annual conference on Information security curriculum development, pp. 46–48 (2004)Google Scholar
- 2.Hu, J., Meinel, C., Schmitt, M.: Tele-lab IT security: an architecture for interactive lessons for security education. ACM SIGCSE Bulletin, SESSION: Computer security 36(1), 412–416 (2004)Google Scholar
- 3.Du, W., Wang, R.: SEED: A suite of instructional laboratories for computer security education. Journal on Educational Resources in Computing (JERIC) 8(1), Article No. 3 (2008)Google Scholar
- 4.Masahiro, N.: A plan and methods of instruction for computer security education in teachers college students. Bulletin of College of Education, University of the Ryukyus (60), 219–228 (2002)Google Scholar
- 5.Tateiwa, Y., Yasuda, T.: Multiuser network administration training in LiNeS: Connection function between virtual networks. In: Proc. of KES-IIMSS 2009, Italy, July 15-17. SCI, vol. 226, pp. 535–544 (2009)Google Scholar
- 6.The User-mode Linux Kernel Home Page, http://user-mode-linux.sourceforge.net/index.html (Accessed February 19, 2010)
- 7.RealVNC - RealVNC remote control software, http://www.realvnc.com/ (Accessed February 19, 2010)
- 8.Snort:: Home Page, http://www.snort.org/ (Accessed February 19, 2010)
- 9.Expect - Home Page, http://expect.nist.gov/ (Accessed February 19, 2010)
- 10.nttcp.c, http://sd.wareonearth.com/~phil/net/ttcp/nttcp.c (Accessed February 19, 2010)