Skip to main content

Building a Virtualized Cybersecurity Lab

Using Industry Support, Academic Programs and Open Source Solution for Setting-Up a Virtualized Cybersecurity Lab

  • Conference paper
  • First Online:
Internet of Things, Infrastructures and Mobile Applications (IMCL 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1192))

Included in the following conference series:

  • 2082 Accesses

Abstract

The domain of cyber security has gained an increased importance in the industry that is naturally reflected in the universities curricula that have included security courses and dedicated programs in their offer. The scope of this paper is to describe the requirements of a cybersecurity virtual platform, the basic mandatory tools to be included and the methods for building a flexible and extensible cyber security laboratory, taking benefit of industry support, academic programs and open source implementations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hart, B.: Building a Security Lab with Virtual Machines, (GSEC V1.4 Option 1), GIAC SANS. https://www.giac.org/paper/gsec/2186/building-security-lab-virtual-machines/103719

  2. Izzat, M., Alsmadi, M.N.A.-K., Abu-Shanab, E.: Requirements and challenges for building a national open security lab. In: First Summit on Countering Cyber Crimes, Riyadh, KSA, 27-29/10/2015, pp. 1-15 (2015)

    Google Scholar 

  3. Niyaz, Q., Sun, W., Xu, R., Alam, M.: LightVN: a light-weight testbed for network and security experiments. In: 12th International Conference on Information Technology - New Generations, pp. 459–464. IEEE (2015)

    Google Scholar 

  4. Bardas, A.G., Xinming, O.: Setting Up and using a cyber security lab for education purposes. Consortium Comput. Sci. Colleges, JCSC 28(5), 191–197 (2013)

    Google Scholar 

  5. Mirkovic, J., Benzel, T.V., Faber, T., Braden, R., Wroclawski, J.T., Schwab, S.: The DETER project: advancing the science of cyber security experimentation and test. In: IEEE International Conference on Technologies for Homeland Security (HST), 8–10 November, IEEE, pp. 1–7

    Google Scholar 

  6. https://www.gns3.com/

  7. http://virl.cisco.com/

  8. https://www.cybrary.it/

  9. https://www.immersivelabs.com/

  10. https://www.pfsense.org/

  11. https://www.ipfire.org/

  12. https://www.kali.org/

  13. https://www.metasploit.com/download

  14. http://www.dvwa.co.uk/

  15. https://www.osboxes.org/

  16. https://securityonion.net/

  17. https://www.alienvault.com/products/ossim

  18. https://www.splunk.com/en_us/solutions/industries/higher-education/academic-licenses.html

  19. https://remnux.org/

  20. https://digital-forensics.sans.org/

  21. Citrix Educational License program. https://www.citrix.com/buy/licensing/programs/education.html

  22. NVIDIA GPU Grant program. https://developer.nvidia.com/academic_gpu_seeding

  23. Li, Y., Esche, S.K., Chassapis, C.: A scheduling system for shared online laboratory resources. In: 2008 38th Annual Frontiers in Education Conference, Saratoga Springs, NY, pp. T2B-1–T2B-6 (2008)

    Google Scholar 

  24. Wang, N., Chen, X., Song, G., Parsaei, H.: Develop a scheduler and federated authentication for remote laboratory access. In: Proceedings of 2015 12th International Conference on Remote Engineering and Virtual Instrumentation (REV), Bangkok, pp. 214–219 (2015)

    Google Scholar 

  25. Stelea, G.A., Fernoaga, V., Gavrila, C., Popescu, V., Murroni, M.: Mobile accessible rich internet web application enhanced with AMP publishing technology. Rev. Air Force Acad. 1, 71–78 (2019)

    Article  Google Scholar 

  26. Hu, J., Sun, Q., Chen, H.: Application of Single sign-on (SSO) in digital campus. In: 2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), Beijing, pp. 725–727 (2010)

    Google Scholar 

Download references

Acknowledgment

We would like to show our gratitude to Atos Romania for their support in proving the hardware platform as sponsorship and integration efforts, Cisco Romania for providing demo version of networking software and other partners that have granted resources via academic programs.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Titus Bălan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Bălan, T., Robu, D., Sandu, F., Bălan, A. (2021). Building a Virtualized Cybersecurity Lab. In: Auer, M.E., Tsiatsos, T. (eds) Internet of Things, Infrastructures and Mobile Applications. IMCL 2019. Advances in Intelligent Systems and Computing, vol 1192. Springer, Cham. https://doi.org/10.1007/978-3-030-49932-7_95

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-49932-7_95

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-49931-0

  • Online ISBN: 978-3-030-49932-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics