Skip to main content

Remotely Accessible Exercise Environment for Intrusion Detection/Defense Exercises Based on Virtual Machine Networks

  • Conference paper

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 4))

Abstract

Network security exercises carried out in laboratories have limitations of time and place. Students cannot exercise during their free time and outside the campus. Furthermore, teaching attack skills to students raises the issue of maintaining ethical standards. We have developed LiNeS (Linux Network Simulator) that generates networks for network administration exercises by using virtual machines; such a network is called a virtual machine network. In this study, we realize a virtual machine network in which attacks are generated automatically in a remotely accessible exercise environment by using LiNeS. Our system can resolve the abovementioned problems because students can completely focus on intrusion detection/defense via PCs connected to the Internet.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Harris, J.: Maintaining ethical standards for a computer security curriculum. In: Proceedings of the 1st annual conference on Information security curriculum development, pp. 46–48 (2004)

    Google Scholar 

  2. Hu, J., Meinel, C., Schmitt, M.: Tele-lab IT security: an architecture for interactive lessons for security education. ACM SIGCSE Bulletin, SESSION: Computer security 36(1), 412–416 (2004)

    Google Scholar 

  3. Du, W., Wang, R.: SEED: A suite of instructional laboratories for computer security education. Journal on Educational Resources in Computing (JERIC) 8(1), Article No. 3 (2008)

    Google Scholar 

  4. Masahiro, N.: A plan and methods of instruction for computer security education in teachers college students. Bulletin of College of Education, University of the Ryukyus (60), 219–228 (2002)

    Google Scholar 

  5. Tateiwa, Y., Yasuda, T.: Multiuser network administration training in LiNeS: Connection function between virtual networks. In: Proc. of KES-IIMSS 2009, Italy, July 15-17. SCI, vol. 226, pp. 535–544 (2009)

    Google Scholar 

  6. The User-mode Linux Kernel Home Page, http://user-mode-linux.sourceforge.net/index.html (Accessed February 19, 2010)

  7. RealVNC - RealVNC remote control software, http://www.realvnc.com/ (Accessed February 19, 2010)

  8. Snort:: Home Page, http://www.snort.org/ (Accessed February 19, 2010)

  9. Expect - Home Page, http://expect.nist.gov/ (Accessed February 19, 2010)

  10. nttcp.c, http://sd.wareonearth.com/~phil/net/ttcp/nttcp.c (Accessed February 19, 2010)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Berlin Heidelberg

About this paper

Cite this paper

Tateiwa, Y., Tatematsu, S., Iwasaki, T., Yasuda, T. (2010). Remotely Accessible Exercise Environment for Intrusion Detection/Defense Exercises Based on Virtual Machine Networks. In: Phillips-Wren, G., Jain, L.C., Nakamatsu, K., Howlett, R.J. (eds) Advances in Intelligent Decision Technologies. Smart Innovation, Systems and Technologies, vol 4. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-14616-9_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-14616-9_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-14615-2

  • Online ISBN: 978-3-642-14616-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics