skip to main content
10.1145/1231047.1231072acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
Article

LAN attacker: a visual education tool

Published: 22 September 2006 Publication History

Abstract

Visualization and animation have been used to aid teaching in many areas of education. In this paper, we present animated visual software that demonstrates network attacks on Local Area Networks. This tool is targeted to assist instructors who teach college level network security and computer networks. We did extensive survey on various attack methods and studied the technical details of attack techniques. The tool accurately and realistically shows attacks such as ARP Poisoning, Port Stealing and MAC Flooding. We integrated features such as high degree user interaction, play and pause, tooltips and quizzes. The tool is implemented using Macromedia Flash 8 because its player is widely used in the web and its versatility in creating interactive animations. We demonstrated this tool to students. Compared to students of previous semester who are taught without this tool, they were more motivated and did better on quiz questions.

References

[1]
Gardner, H, Frames of Mind: The Theory of Multiple Intelligences, New York: Back Books, Inc., 1985.
[2]
Holliday, M. A., Animation of computer networking concepts, ACM Journal of Educational Resources in Computing, Vol. 3, No. 2, 2003.
[3]
Null, L. and Rao K., CAMERA: Introducing Memory Concepts via visualization, ACM SIGCSE Bulletin, Vol. 37, Issue 1, 2005.
[4]
Shene, C. K., ThreadMentor - A system for teaching multithreaded programming, http://www.cs.mtu.edu/~shene/NSF-3/.
[5]
GVU Center, Algorithm animation, http://www.cc.gatech.edu/gvu/softviz/algoanim/
[6]
Naps, T. L. et. al. Exploring the role of visualization and engagement in computer science education, ACM SIGCSE Bulletin, Vol. 35, Issue 2, pg. 131--152, 2003.
[7]
Kehoe, C., Stasko, J. and Taylor, A., Rethinking the Evaluation of Algorithm Animations as Learning Aids: An Observational Study, Graphics, Visualization, and Usability Center, Georgia Institute of Technology, Atlanta, GA, Technical Report GIT-GVU-99-10, March 1999.
[8]
ARP Poison Routing, http://www.oxid.it/downloads/aprintro.swf
[9]
Anatomy of an ARP Poisoning Attack: http://www.watchguard.com/infocenter/editorial/135324.asp
[10]
ARP Spoofing, http://en.wikipedia.org/wiki/ARP_poisoning
[11]
ARP Toxin---ARP Poisoning Utility for Windows, http://www.securiteam.com/tools/6C00E2A95U.html
[12]
Ettercap, http://ettercap.sourceforge.net
[13]
dsniff, http://naughty.monkey.org/~dugsong/dsniff/
[14]
Ethereal, http://www.ethereal.com
[15]
Life of Brain, http://www.mwscomp.com/movies/brian/brian-19.htm
[16]
Cain & Abel, http://www.oxid.it/cain.html
[17]
Cooper, G. Cognity load theory as an aid for instructional design, Australian Journal of Educational Technology, 1990.
[18]
http://www.themanager.org/resources/attack_from_within.htm

Cited By

View all
  • (2022)Learn ARP Spoofing Attack in a Game2022 IEEE Frontiers in Education Conference (FIE)10.1109/FIE56618.2022.9962649(1-5)Online publication date: 8-Oct-2022
  • (2018)Examine the effectiveness of using traditional techniques for teaching and learning CUDA programmingJournal of Computing Sciences in Colleges10.5555/3204979.320501333:5(173-178)Online publication date: 1-May-2018
  • (2017)An interactive visualization tool for teaching ARP spoofing attack2017 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2017.8190531(1-5)Online publication date: Oct-2017
  • Show More Cited By

Index Terms

  1. LAN attacker: a visual education tool

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    InfoSecCD '06: Proceedings of the 3rd annual conference on Information security curriculum development
    September 2006
    206 pages
    ISBN:1595934375
    DOI:10.1145/1231047
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 September 2006

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. computers and education
    2. educational software
    3. network security
    4. visualization

    Qualifiers

    • Article

    Conference

    InfoSecCD06

    Acceptance Rates

    Overall Acceptance Rate 18 of 23 submissions, 78%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)2
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Learn ARP Spoofing Attack in a Game2022 IEEE Frontiers in Education Conference (FIE)10.1109/FIE56618.2022.9962649(1-5)Online publication date: 8-Oct-2022
    • (2018)Examine the effectiveness of using traditional techniques for teaching and learning CUDA programmingJournal of Computing Sciences in Colleges10.5555/3204979.320501333:5(173-178)Online publication date: 1-May-2018
    • (2017)An interactive visualization tool for teaching ARP spoofing attack2017 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2017.8190531(1-5)Online publication date: Oct-2017
    • (2016)Developing and evaluating a hands-on lab for teaching local area network vulnerabilities2016 IEEE Frontiers in Education Conference (FIE)10.1109/FIE.2016.7757364(1-4)Online publication date: Oct-2016
    • (2009)Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic ProtocolsProceedings of the 1st International Visual Informatics Conference on Visual Informatics: Bridging Research and Practice10.1007/978-3-642-05036-7_48(510-520)Online publication date: 15-Nov-2009
    • (2007)An animated learning tool for Kerberos authentication architectureJournal of Computing Sciences in Colleges10.5555/1231091.123111622:6(147-155)Online publication date: 1-Jun-2007

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media