Skip to main content

Development of Network Cyber Attack Training Curriculum for Security Staff

  • Conference paper
  • First Online:
Advances in Computer Science and Ubiquitous Computing (CUTE 2017, CSA 2017)

Abstract

Recently, the frequency of cyber attacks targeting the information assets of firms or institutions is continuously increasing. Although there are measures such as reinforcement of security policies, regulations, information protection organizations and physical security in addition to replacement of security equipments for protecting the assets, the core of the cyber security is responding to the security breaches. For this reason, producing well-trained security personnel (computer emergency responders) is essential. Although there are many publications dealing with the theories of cyber security, the learning materials that can be referred by the security personnel mainly for practices are somehow in short supply. Thus, in this study, a curriculum for network cyber attack training has been developed for the security personnel. The curriculum focuses on actual implementation of network-attacking environments, simulated attacking methods, attack pattern analysis and countermeasures.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Huh, J.-H., et al.: Implementation of DDoS botnet detection system on local area network. J. Korea Multimed. Soc. 16(6), 678–688 (2013). (In Korean)

    Article  Google Scholar 

  2. Huh, J.-H., Seo, K.: A case study of the base technology for the smart grid security: focusing on a performance improvement of the basic algorithm for the DDoS attacks detection using CUDA. J. Korea Multimed. Soc. 19(2), 411–417 (2016)

    Article  Google Scholar 

  3. Huh, J.-H., Lee, D., Seo, K.: Implementation of graphic based network intrusion detection system for server operation. Int. J. Secur. Appl. SERSC 9(2), 37–48 (2015)

    Google Scholar 

  4. Kajioka, S., Mori, T., Uchiya, T., Takumi, I., Matsuo, H.: Experiment of indoor position presumption based on RSSI of bluetooth LE beacon. In: 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), pp. 337–339. IEEE (2014)

    Google Scholar 

  5. Huh, J.-H.: Design and android application for monitoring system using PLC for ICT-Integrated Fish Farm. In: MUE 2016. LNEE, vol. 393, pp. 617–625 (2016)

    Google Scholar 

  6. Huang, H., Gartner, G., Schmidt, M., Li, Y.: Smart environment for ubiquitous indoor navigation. In: International Conference on New Trends in Information and Service Science, NISS 2009, pp. 176–180. IEEE (2009)

    Google Scholar 

  7. Huh, J.-H., Seo, K.: Design and test bed experiments of server operation system using virtualization technology. Hum.-centric Comput. Inf. Sci. 6(1), 1–21 (2016). Springer, Berlin, Heidelberg

    Article  Google Scholar 

  8. Huh, J.-H., Je, S.-M., Seo, K.: Communications-based technology for smart grid test bed using OPNET simulations. In: Information Science and Applications (ICISA) 2016. LNEE, vol. 376, pp. 227–233. Springer (2016)

    Google Scholar 

  9. Huh, J.-H., Otgonchimeg, S., Seo, K.: Advanced metering infrastructure design and test bed experiment using intelligent agents: focusing on the PLC network base technology for Smart Grid system. J. Supercomput. 72(5), 1862–1877 (2016). Springer, USA

    Article  Google Scholar 

  10. Park, J., et al.: Design of the real-time mobile push system for implementation of the shipboard smart working. In: Advances in Computer Science and Ubiquitous Computing (CUTE 2015). LNEE, vol. 373, pp. 541–548. Springer (2015)

    Google Scholar 

  11. Peng, J., Chen, H.: A GPU-based high performance multi-string matching system. In: Proceeding of IEEE International Conference on Future Computer and Communication, vol. 1, pp. 66–81 (2010)

    Google Scholar 

  12. Schatz, M., Trapnell, C.: Fast Exact String Matching on the GPU, pp. 1–6. Citeseer (2007)

    Google Scholar 

  13. Lin, C.H., Tsai, S.Y., Liu, C.H., Chang, S.C.: Accelerating string matching using multithreaded algorithm on GPU. In: Proceeding of IEEE Global Telecommunications Conference, pp. 1–5 (2010)

    Google Scholar 

  14. Knuth, D., Morris, J., Pratt, V.: Fast pattern matching in strings. SIAM J. Comput. 6(2), 323–350 (1977)

    Article  MathSciNet  Google Scholar 

  15. Paessler, D.: Server virtualization and network management. Database Netw. J. 38(5), 13–16 (2008)

    Google Scholar 

  16. Taylor, C.: Consolidation Server: How to enhance utilization of servers and storage. Manuf. Comput. Solut. 12(5), 26 (2006)

    Google Scholar 

  17. Botero, J.F., Hesselbach, X.: Greener networking in a network virtualization environment. Comput. Net. 57(9), 2021–2039 (2013)

    Article  Google Scholar 

  18. Jain, R., Paul, S.: Network virtualization and software defined networking for cloud computing: a survey. IEEE Commun. Mag. 51(11), 24–31 (2013)

    Article  Google Scholar 

  19. Zhao, G.Y., Tang, H.F., Xiao, L.M., Li, X.Q.: Efficient inline deduplication on VM images in desktop virtualization environment. Appl. Mech. Mater. 307, 488–493 (2013)

    Article  Google Scholar 

  20. Wang, X., Zhang, B., Luo, Y.: Optimizing interactive performance for desktop-virtualization environment optimizing interactive performance for desktop-virtualization environment. Lecture Notes in computer science (LNCS), vol. 7719, pp. 541–555. Springer, Berlin (2013)

    Google Scholar 

  21. Cohen, E., Paul, W., Schmaltz, S.: Theory of multi core hypervisor verification. Lecture Notes in Computer Science (LNCS), pp. 1–27. Springer, Berlin (2013)

    Google Scholar 

  22. Huh, J.-H.: Designing and Implementation of Networks Learning Systems by Using Virtual Computers. Thesis of Department of Computer Science Education, Pukyong National University at Daeyeon, pp. 1–77 (2012)

    Google Scholar 

  23. Huh, J.-H.: Designing of image processing curriculum considering network security. Asia Pac. J. Multimed. Serv. Converg. Art Humanit. Sociol. 7(6), 861–869 (2017)

    Google Scholar 

  24. Wang, S., Xu, D., Yan, S.: Analysis and application of Wireshark in TCP/IP protocol teaching. In: 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies, IEEE EDT, pp. 269–272 (2010)

    Google Scholar 

  25. Bae, Y.-K., Lim, J.-S., Lee, T.-W.: A study on the improvement directions of computer curriculum in elementary school. J. Korean Assoc. Comput. Educ. 8(3), 29–42 (2005). (In Korean)

    Google Scholar 

  26. Huh, J.-H., Seo, K.: Development of competency-oriented social multimedia computer network curriculum. J. Multimed. Inf. Syst. Korea Multimed. Soc. 1(2), 133–142 (2014)

    Google Scholar 

  27. Huh, J.-H.: Information communication ethical study on the protection of digital copyrights and alternatives: focusing on the secondary school students. J. Multimed. Inf. Syst. Korea Multimed. Soc. 3(2), 27–34 (2016)

    Google Scholar 

  28. Huh, J.-H.: PLC-based design of monitoring system for ICT-integrated vertical fish farm. Hum.-centric Comput. Inf. Sci. 7(1), 1–19 (2017). Springer, Berlin, Heidelberg

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jonghyeon Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, GI., Kim, J. (2018). Development of Network Cyber Attack Training Curriculum for Security Staff. In: Park, J., Loia, V., Yi, G., Sung, Y. (eds) Advances in Computer Science and Ubiquitous Computing. CUTE CSA 2017 2017. Lecture Notes in Electrical Engineering, vol 474. Springer, Singapore. https://doi.org/10.1007/978-981-10-7605-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-7605-3_35

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-7604-6

  • Online ISBN: 978-981-10-7605-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics