skip to main content
10.1145/2498328.2500077acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course

Published: 04 April 2013 Publication History

Abstract

Cyber security is an area where much curriculum development is taking place, and it is important that such efforts be shared. In this work we describe three lab exercises developed at the United States Naval Academy for use in our fundamentals of cyber-security course, a course required of all freshmen. The hands-on lab activities reinforce ideas presented in classroom discussions about basic network reconnaissance, attack, and defense. A class of approximately twenty students is divided into two teams. Each team's network has its own workstation, name server, and gateway router, and a webserver. Students each have an individual host machine on their own network. In the reconnaissance lab students attempt to discover the opponent network's topology, services and software, as well as guess account names and potential passwords. The information is then used in the succeeding attack lab, where denial of service attacks, injection attacks, and other remote exploits are conducted. During the defense lab, students harden their systems by managing accounts and passwords in both Unix and Windows systems, encrypting confidential files, defending against HTML injection attacks, configuring a firewall, shutting down unnecessary services, removing unnecessary software, and patching known vulnerabilities; all while maintaining a prescribed set of services. All three labs are conducted using virtual machines (VMs) in a virtual. Detailed instructor notes, lab instructions, student check sheets, grading sheets, and supporting software were developed for these labs. In this paper we discuss our experiences with these labs, assessment and evaluation material, and lessons learned. The insights that we have gained will prove useful to those thinking about implementing or refining labs in a cyber-security course, or perhaps even for other types of labs.

References

[1]
President's Cyberspace Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure, May 2009. DOI=http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf.
[2]
Jabbour, K. and Older S. 2010. A Learning Community for Developing Cyber-Security Leaders. The Advanced Course in Engineering on Cyber Security. DOI=http://www.cis.syr.edu/~sueo/papers/ace-wecs.pdf.
[3]
Anon. 2011. Information Assurance Internship. DOI=http://iainternship.com/images/IA_Internship_Flyer_9132011.pdf.
[4]
Department of Computer Science, University of Maryland. 2012. CMSC 498L/ENEE 459L, Cybersecurity Lab. DOI=http://www.cs.umd.edu/class/fall2012/cmsc498L/.
[5]
School of Computing, Department of Information Technology, University of South Alabama. 2012. DOI=https://paws.usouthal.edu/prod/bwckctlg.p_display_courses.
[6]
Office of the Dean, United States Military Academy, West Point, New York. DOI=http://www.dean.usma.edu/sebpublic/curriccat/static/index.htm.
[7]
Brown, C., et al. 2012. Anatomy, Dissection, and Mechanics of an Introductory Cyber-Security Class's Curriculum at the United States Naval Academy. In ASEE Computers in Education Journal, 3(3):63--80

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ACMSE '13: Proceedings of the 51st annual ACM Southeast Conference
April 2013
224 pages
ISBN:9781450319010
DOI:10.1145/2498328
  • General Chair:
  • Ashraf Saad
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 April 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cyber-security education
  2. cyberspace policy review
  3. hands-on laboratory exercises
  4. information assurance
  5. naval academy
  6. network attack
  7. network defense
  8. network reconnaissance

Qualifiers

  • Research-article

Conference

ACM SE'13
Sponsor:
ACM SE'13: ACM Southeast Regional 2013
April 4 - 6, 2013
Georgia, Savannah

Acceptance Rates

Overall Acceptance Rate 502 of 1,023 submissions, 49%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)20
  • Downloads (Last 6 weeks)3
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media