Abstract
Due to rapid development of IT technology, almost all things are being databased and as the value of information assets, the number of cyber attacks is increasing. Accordingly, the role of the white-hackers is becoming important, as well as their training. For the training, a simulated network infiltration test environment has been constructed in this study by using VMware’s virtualization technique to allow potential white-hackers to study the basics in networking area and some of the major attacking techniques which were actually put into the tests.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kim, J.: Thermal Modeling of In-Situ Curing of Composite Cylinders Using Infrared Radiation. Ph.D thesis of Mechanical Systems & Design Area. Mechanical Engineering Department, University of Texas at Austin (1997)
Huh, J.-H., et al.: Implementation of DDoS botnet detection system on local area network. J. Korea Multimed. Soc. 16(6), 678–688 (2013). (In Korean)
Huh, J.-H., Seo, K.: A case study of the base technology for the smart grid security: focusing on a performance improvement of the basic algorithm for the DDoS attacks detection using CUDA. J. Korea Multimed. Soc. 19(2), 411–417 (2016)
Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. SERSC 9(2), 37–48 (2015)
Kajioka, S., Mori, T., Uchiya, T., Takumi, I., Matsuo, H.: Experiment of indoor position presumption based on RSSI of bluetooth LE beacon. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 337–339. IEEE (2014)
Huh, J.H.: Design and android application for monitoring system using PLC for ICT-Integrated Fish Farm, In: MUE 2016. LNEE, vol. 393, pp. 617–625 (2016)
Huang, H., Gartner, G., Schmidt, M., Li, Y.: Smart environment for ubiquitous indoor navigation. In: International Conference on New Trends in Information and Service Science, NISS 2009, pp. 176–180. IEEE (2009)
Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. 6(1), 1–21 (2016). Springer, Berlin Heidelberg
Huh, J.H., Je, S.-M, Seo, K.: Communications-based technology for smart grid test bed using OPNET simulations. In: Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 227–233. Springer (2016)
Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5), 1862–1877 (2016). Springer, USA
Park, J., et al.: Design of the real-time mobile push system for implementation of the shipboard smart working. In: Advances in Computer Science and Ubiquitous Computing, (CUTE 2015). LNEE, vol. 373, pp. 541–548. Springer (2015)
Ueno, H., Hasegawa, S., Hasegawa, T.: Virtage: server virtualization with hardware transparency. Lecture Notes in Computer Science (LNCS), pp. 404–413. Springer, Berlin (2010)
Paessler, D.: Server virtualization and network management. Database Netw. J. 38(5), 13–16 (2008)
Taylor, C.: Consolidation server: how to enhance utilization of servers and storage. Manuf. Comput. Solut. 12(5), 26 (2006)
Botero, J.F., Hesselbach, X.: Greener networking in a network virtualization environment. Comput. Net. 57(9), 2021–2039 (2013)
Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24–31 (2013)
Zhao, G.Y., Tang, H.F., Xiao, L.M., Li, X.Q.: Efficient inline deduplication on VM images in desktop virtualization environment. Appl. Mech. Mater. 307, 488–493 (2013)
Wang, X., Zhang, B., Luo, Y.: Optimizing interactive performance for desktop-virtualization environment. Lecture Notes in Computer Science (LNCS), vol. 7719, pp. 541–555. Springer, Berlin (2013)
Cohen, E., Paul, W., Schmaltz, S.: Theory of multi core hypervisor verification. Lecture Notes in Computer Science (LNCS), pp. 1–27. Springer, Berlin (2013)
Thorpe, S., Ray, I., Grandison, T., Barbir, A.: Hypervisor event logs as a source of consistent virtual machine evidence for forensic cloud investigations. Lecture Notes in Computer Science (LNCS), pp. 97–112. Springer, Berlin (2013)
Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1–19 (2017). Springer, Heidelberg
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kim, GI., Kim, J. (2018). A Simulated Infiltration Test for Network in Virtual Environment Using VMware Virtualization Technique. In: Park, J., Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in Electrical Engineering, vol 474. Springer, Singapore. https://doi.org/10.1007/978-981-10-7605-3_34
Download citation
DOI: https://doi.org/10.1007/978-981-10-7605-3_34
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7604-6
Online ISBN: 978-981-10-7605-3
eBook Packages: EngineeringEngineering (R0)