skip to main content
10.1145/2978192.2978229acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation

Published:28 September 2016Publication History

ABSTRACT

Recently, smartphones have been growing increasingly in popularity within the student community. Hence, novel educational activities and tools, as well as learning approaches can be developed to get benefit from the prevalence of smartphones (e.g. mobility and closeness to students' daily lives). This paper discusses an Android mobile app, called Packets Generator, that aims at taking advantages of the benefits of smartphones and the best practices in learning information security, as well as promoting students' interests and increasing their self-efficacy. Packets Generator app allows students to further enhance their hands-on skills on network traffic and Denial of Service (DoS) attacks generation, using their smartphones, by practicing inside as well as outside the traditional desktop based laboratories, in the real-world environment; i.e., anywhere and anytime, at the students' convenience. Packets Generator app is freely available at Google Play Store. Based on statistics from Google Play Store, in about two years, the app turned popular with more than 50,000 downloads worldwide and around 3.73/5.0 users' rating. The impact of the app on the students' performance in terms of achieving the course outcomes is discussed.

References

  1. P. Bhattacharya, L. Yang, M. Guo, K. Qian, and M. Yang, "Learning mobile security with Labware," IEEE Security & Privacy, 2014, Volume 12, Issue 1, pp. 69--72.Google ScholarGoogle ScholarCross RefCross Ref
  2. Alan Levine, Joanne Kossuth, "The Future of Mobile Computing," Mobile Computing Spotlight Series, Part of the Mobile Computing 5-Day EDUCAUSE Sprint, April 25, 2011.Google ScholarGoogle Scholar
  3. Michael E. Whitman, Herbert J. Mattord, and Andrew W. Green. "Hands-On Information Security Lab Manual," 4th Edition. Cengage Learning, 2014.Google ScholarGoogle Scholar
  4. Z. Trabelsi, K. Hayawi, A. Al Braiki, and S. S. Mathew, "Network Attacks and Defenses: A Hands-on Approach," CRC Press, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Z. Trabelsi and L. Al Ketbi, "Using Network Packet Generators and Snort Rules for teaching Denial of Service Attacks", Proc. 18th ACM Conference on Innovation and in Computer Science Education, ITiCSE'13, 2013, pp. 285--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Z. Trabelsi, "Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning," Proc. Information Security Curriculum Development Conference, 2011, pp. 74--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. G. Vigna. "Teaching network security through live exercises," In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, pages 3--18. Kluwer, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Vigna. "Teaching hands-on network security: Testbeds and live exercises," Journal of Information Warfare, 2(3), pages 8--24, 2003.Google ScholarGoogle Scholar
  9. Dongqing Yuan, and Jiling Zhong. "A lab implementation of SYN flood attack and defense," SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education, pp. 57--58, Cincinnati, Ohio, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sergio Caltagirone, Paul Ortman, Sean Melton, David Manz, Kyle King, and Paul Oman. "Design and Implementation of a Multi-Use Attack-Defend Computer Security Lab," Proceedings of the 39th Annual Hawaii International Conference on System Sciences - HICSS, USA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. M. Hill, C. A. Carver Jr., J. W. Humphries, and U. W. Pooch, "Using an isolated network laboratory to teach advanced networks and security," in 32nd SIGCSE Technical Symposium on Computer Science Education. Charlotte, North Carolina, United States: ACM Press, 2001, pp. 36--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Zouheir Trabelsi and Umniya Mustafa, "A Web-based Firewall Simulator Tool for Information Security Education," Proceedings of the 16th Australasian Computing Education Conference (ACE2014), CRPIT. Vol. 148, pp.: 83--90, 2014, Auckland, New Zealand. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jeremy Andrus, Jason Nieh, "Teaching Operating Systems Using Android," Proc. of the 43rd ACM Technical Symposium on Computer Science Education (SIGCSE 2012), 2012, pp. 613--618. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Guo, P. Bhattacharya, M. Yang, K. Qian, and L. Yang, "Learning mobile security with android security Labware", Proc. of the 44th ACM technical symposium on Computer Science Education (SIGCSE 2013), pp.675--680. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Arce, I., & McGraw, G. (2004). Guest editors' introduction: Why attacking systems is a good idea. IEEE Security & Privacy, 2(4), 17--19. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Logan, P. and Clarkson, A. (2005). Teaching Students to Hack: Curriculum Issues in Information Security. Proceedings of the 36th SIGCSE Technical Symposium on Computer Science, ACM SIGCSE, pp. 157--161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Damon, E., Dale J., Land, N., Weiss, R., (2012). Hands-on Denial of Service Lab Exercises Using Slowloris and RUDY, In the Proceedings of the 2012 Information Security Curriculum Development Conference, pp. 21--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Cook T., Conti G., and Raymond D. (2012). When Good Ninjas Turn bad: Preventing Your Students from becoming the Threat. Proceedings of the 16th Colloquium for Information System Security Education, pp. 61--67.Google ScholarGoogle Scholar
  19. Harris, J. Maintaining ethical standards for computer security curriculum. In InfoSecCD'04: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, pages 46--48, New York, NY, USA, 2004, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SIGITE '16: Proceedings of the 17th Annual Conference on Information Technology Education
      September 2016
      188 pages
      ISBN:9781450344524
      DOI:10.1145/2978192

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 September 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      SIGITE '16 Paper Acceptance Rate26of67submissions,39%Overall Acceptance Rate176of429submissions,41%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader