Abstract
Recently, the frequency of cyber attacks targeting the information assets of firms or institutions is continuously increasing. Although there are measures such as reinforcement of security policies, regulations, information protection organizations and physical security in addition to replacement of security equipments for protecting the assets, the core of the cyber security is responding to the security breaches. For this reason, producing well-trained security personnel (computer emergency responders) is essential. Although there are many publications dealing with the theories of cyber security, the learning materials that can be referred by the security personnel mainly for practices are somehow in short supply. Thus, in this study, a curriculum for network cyber attack training has been developed for the security personnel. The curriculum focuses on actual implementation of network-attacking environments, simulated attacking methods, attack pattern analysis and countermeasures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Huh, J.-H., et al.: Implementation of DDoS botnet detection system on local area network. J. Korea Multimed. Soc. 16(6), 678–688 (2013). (In Korean)
Huh, J.-H., Seo, K.: A case study of the base technology for the smart grid security: focusing on a performance improvement of the basic algorithm for the DDoS attacks detection using CUDA. J. Korea Multimed. Soc. 19(2), 411–417 (2016)
Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. SERSC 9(2), 37–48 (2015)
Kajioka, S., Mori, T., Uchiya, T., Takumi, I., Matsuo, H.: Experiment of indoor position presumption based on RSSI of bluetooth LE beacon. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 337–339. IEEE (2014)
Huh, J.-H.: Design and android application for monitoring system using PLC for ICT-Integrated Fish Farm. In: MUE 2016. LNEE, vol. 393, pp. 617–625 (2016)
Huang, H., Gartner, G., Schmidt, M., Li, Y.: Smart environment for ubiquitous indoor navigation. In: International Conference on New Trends in Information and Service Science, NISS 2009, pp. 176–180. IEEE (2009)
Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. 6(1), 1–21 (2016). Springer, Berlin, Heidelberg
Huh, J.-H., Je, S.-M., Seo, K.: Communications-based technology for smart grid test bed using OPNET simulations. In: Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 227–233. Springer (2016)
Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5), 1862–1877 (2016). Springer, USA
Park, J., et al.: Design of the real-time mobile push system for implementation of the shipboard smart working. In: Advances in Computer Science and Ubiquitous Computing (CUTE 2015). LNEE, vol. 373, pp. 541–548. Springer (2015)
Peng, J., Chen, H.: A GPU-based high performance multi-string matching system. In: Proceeding of IEEE International Conference on Future Computer and Communication, vol. 1, pp. 66–81 (2010)
Schatz, M., Trapnell, C.: Fast Exact String Matching on the GPU, pp. 1–6. Citeseer (2007)
Lin, C.H., Tsai, S.Y., Liu, C.H., Chang, S.C.: Accelerating string matching using multithreaded algorithm on GPU. In: Proceeding of IEEE Global Telecommunications Conference, pp. 1–5 (2010)
Knuth, D., Morris, J., Pratt, V.: Fast pattern matching in strings. SIAM J. Comput. 6(2), 323–350 (1977)
Paessler, D.: Server virtualization and network management. Database Netw. J. 38(5), 13–16 (2008)
Taylor, C.: Consolidation Server: How to enhance utilization of servers and storage. Manuf. Comput. Solut. 12(5), 26 (2006)
Botero, J.F., Hesselbach, X.: Greener networking in a network virtualization environment. Comput. Net. 57(9), 2021–2039 (2013)
Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24–31 (2013)
Zhao, G.Y., Tang, H.F., Xiao, L.M., Li, X.Q.: Efficient inline deduplication on VM images in desktop virtualization environment. Appl. Mech. Mater. 307, 488–493 (2013)
Wang, X., Zhang, B., Luo, Y.: Optimizing interactive performance for desktop-virtualization environment optimizing interactive performance for desktop-virtualization environment. Lecture Notes in computer science (LNCS), vol. 7719, pp. 541–555. Springer, Berlin (2013)
Cohen, E., Paul, W., Schmaltz, S.: Theory of multi core hypervisor verification. Lecture Notes in Computer Science (LNCS), pp. 1–27. Springer, Berlin (2013)
Huh, J.-H.: Designing and Implementation of Networks Learning Systems by Using Virtual Computers. Thesis of Department of Computer Science Education, Pukyong National University at Daeyeon, pp. 1–77 (2012)
Huh, J.-H.: Designing of image processing curriculum considering network security. Asia Pac. J. Multimed. Serv. Converg. Art Humanit. Sociol. 7(6), 861–869 (2017)
Wang, S., Xu, D., Yan, S.: Analysis and application of Wireshark in TCP/IP protocol teaching. In: 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies, IEEE EDT, pp. 269–272 (2010)
Bae, Y.-K., Lim, J.-S., Lee, T.-W.: A study on the improvement directions of computer curriculum in elementary school. J. Korean Assoc. Comput. Educ. 8(3), 29–42 (2005). (In Korean)
Huh, J.-H., Seo, K.: Development of competency-oriented social multimedia computer network curriculum. J. Multimed. Inf. Syst. Korea Multimed. Soc. 1(2), 133–142 (2014)
Huh, J.-H.: Information communication ethical study on the protection of digital copyrights and alternatives: focusing on the secondary school students. J. Multimed. Inf. Syst. Korea Multimed. Soc. 3(2), 27–34 (2016)
Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1–19 (2017). Springer, Berlin, Heidelberg
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kim, GI., Kim, J. (2018). Development of Network Cyber Attack Training Curriculum for Security Staff. In: Park, J., Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in Electrical Engineering, vol 474. Springer, Singapore. https://doi.org/10.1007/978-981-10-7605-3_35
Download citation
DOI: https://doi.org/10.1007/978-981-10-7605-3_35
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-7604-6
Online ISBN: 978-981-10-7605-3
eBook Packages: EngineeringEngineering (R0)