Advertisement

Remotely Accessible Exercise Environment for Intrusion Detection/Defense Exercises Based on Virtual Machine Networks

  • Yuichiro Tateiwa
  • Shoko Tatematsu
  • Tomohiro Iwasaki
  • Takami Yasuda
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 4)

Abstract

Network security exercises carried out in laboratories have limitations of time and place. Students cannot exercise during their free time and outside the campus. Furthermore, teaching attack skills to students raises the issue of maintaining ethical standards. We have developed LiNeS (Linux Network Simulator) that generates networks for network administration exercises by using virtual machines; such a network is called a virtual machine network. In this study, we realize a virtual machine network in which attacks are generated automatically in a remotely accessible exercise environment by using LiNeS. Our system can resolve the abovementioned problems because students can completely focus on intrusion detection/defense via PCs connected to the Internet.

Keywords

Virtual Machine System Information Execution Environment Presentation Function Exercise Environment 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Harris, J.: Maintaining ethical standards for a computer security curriculum. In: Proceedings of the 1st annual conference on Information security curriculum development, pp. 46–48 (2004)Google Scholar
  2. 2.
    Hu, J., Meinel, C., Schmitt, M.: Tele-lab IT security: an architecture for interactive lessons for security education. ACM SIGCSE Bulletin, SESSION: Computer security 36(1), 412–416 (2004)Google Scholar
  3. 3.
    Du, W., Wang, R.: SEED: A suite of instructional laboratories for computer security education. Journal on Educational Resources in Computing (JERIC) 8(1), Article No. 3 (2008)Google Scholar
  4. 4.
    Masahiro, N.: A plan and methods of instruction for computer security education in teachers college students. Bulletin of College of Education, University of the Ryukyus (60), 219–228 (2002)Google Scholar
  5. 5.
    Tateiwa, Y., Yasuda, T.: Multiuser network administration training in LiNeS: Connection function between virtual networks. In: Proc. of KES-IIMSS 2009, Italy, July 15-17. SCI, vol. 226, pp. 535–544 (2009)Google Scholar
  6. 6.
    The User-mode Linux Kernel Home Page, http://user-mode-linux.sourceforge.net/index.html (Accessed February 19, 2010)
  7. 7.
    RealVNC - RealVNC remote control software, http://www.realvnc.com/ (Accessed February 19, 2010)
  8. 8.
    Snort:: Home Page, http://www.snort.org/ (Accessed February 19, 2010)
  9. 9.
    Expect - Home Page, http://expect.nist.gov/ (Accessed February 19, 2010)
  10. 10.
    nttcp.c, http://sd.wareonearth.com/~phil/net/ttcp/nttcp.c (Accessed February 19, 2010)

Copyright information

© Springer Berlin Heidelberg 2010

Authors and Affiliations

  • Yuichiro Tateiwa
    • 1
  • Shoko Tatematsu
    • 2
  • Tomohiro Iwasaki
    • 3
  • Takami Yasuda
    • 3
  1. 1.Graduate School of EngineeringNagoya Institute of TechnologyNagoya-shiJapan
  2. 2.School of Informatics and SciencesNagoya UniversityNagoya-shiJapan
  3. 3.Graduate School of Information ScienceNagoya UniversityNagoya-shiJapan

Personalised recommendations