ABSTRACT
Recently, smartphones have been growing increasingly in popularity within the student community. Hence, novel educational activities and tools, as well as learning approaches can be developed to get benefit from the prevalence of smartphones (e.g. mobility and closeness to students' daily lives). This paper discusses an Android mobile app, called Packets Generator, that aims at taking advantages of the benefits of smartphones and the best practices in learning information security, as well as promoting students' interests and increasing their self-efficacy. Packets Generator app allows students to further enhance their hands-on skills on network traffic and Denial of Service (DoS) attacks generation, using their smartphones, by practicing inside as well as outside the traditional desktop based laboratories, in the real-world environment; i.e., anywhere and anytime, at the students' convenience. Packets Generator app is freely available at Google Play Store. Based on statistics from Google Play Store, in about two years, the app turned popular with more than 50,000 downloads worldwide and around 3.73/5.0 users' rating. The impact of the app on the students' performance in terms of achieving the course outcomes is discussed.
- P. Bhattacharya, L. Yang, M. Guo, K. Qian, and M. Yang, "Learning mobile security with Labware," IEEE Security & Privacy, 2014, Volume 12, Issue 1, pp. 69--72.Google ScholarCross Ref
- Alan Levine, Joanne Kossuth, "The Future of Mobile Computing," Mobile Computing Spotlight Series, Part of the Mobile Computing 5-Day EDUCAUSE Sprint, April 25, 2011.Google Scholar
- Michael E. Whitman, Herbert J. Mattord, and Andrew W. Green. "Hands-On Information Security Lab Manual," 4th Edition. Cengage Learning, 2014.Google Scholar
- Z. Trabelsi, K. Hayawi, A. Al Braiki, and S. S. Mathew, "Network Attacks and Defenses: A Hands-on Approach," CRC Press, 2013. Google ScholarDigital Library
- Z. Trabelsi and L. Al Ketbi, "Using Network Packet Generators and Snort Rules for teaching Denial of Service Attacks", Proc. 18th ACM Conference on Innovation and in Computer Science Education, ITiCSE'13, 2013, pp. 285--290. Google ScholarDigital Library
- Z. Trabelsi, "Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning," Proc. Information Security Curriculum Development Conference, 2011, pp. 74--83. Google ScholarDigital Library
- G. Vigna. "Teaching network security through live exercises," In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, pages 3--18. Kluwer, 2003. Google ScholarDigital Library
- G. Vigna. "Teaching hands-on network security: Testbeds and live exercises," Journal of Information Warfare, 2(3), pages 8--24, 2003.Google Scholar
- Dongqing Yuan, and Jiling Zhong. "A lab implementation of SYN flood attack and defense," SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education, pp. 57--58, Cincinnati, Ohio, USA, 2008. Google ScholarDigital Library
- Sergio Caltagirone, Paul Ortman, Sean Melton, David Manz, Kyle King, and Paul Oman. "Design and Implementation of a Multi-Use Attack-Defend Computer Security Lab," Proceedings of the 39th Annual Hawaii International Conference on System Sciences - HICSS, USA, 2006. Google ScholarDigital Library
- J. M. Hill, C. A. Carver Jr., J. W. Humphries, and U. W. Pooch, "Using an isolated network laboratory to teach advanced networks and security," in 32nd SIGCSE Technical Symposium on Computer Science Education. Charlotte, North Carolina, United States: ACM Press, 2001, pp. 36--40. Google ScholarDigital Library
- Zouheir Trabelsi and Umniya Mustafa, "A Web-based Firewall Simulator Tool for Information Security Education," Proceedings of the 16th Australasian Computing Education Conference (ACE2014), CRPIT. Vol. 148, pp.: 83--90, 2014, Auckland, New Zealand. Google ScholarDigital Library
- Jeremy Andrus, Jason Nieh, "Teaching Operating Systems Using Android," Proc. of the 43rd ACM Technical Symposium on Computer Science Education (SIGCSE 2012), 2012, pp. 613--618. Google ScholarDigital Library
- M. Guo, P. Bhattacharya, M. Yang, K. Qian, and L. Yang, "Learning mobile security with android security Labware", Proc. of the 44th ACM technical symposium on Computer Science Education (SIGCSE 2013), pp.675--680. Google ScholarDigital Library
- Arce, I., & McGraw, G. (2004). Guest editors' introduction: Why attacking systems is a good idea. IEEE Security & Privacy, 2(4), 17--19. Google ScholarDigital Library
- Logan, P. and Clarkson, A. (2005). Teaching Students to Hack: Curriculum Issues in Information Security. Proceedings of the 36th SIGCSE Technical Symposium on Computer Science, ACM SIGCSE, pp. 157--161. Google ScholarDigital Library
- Damon, E., Dale J., Land, N., Weiss, R., (2012). Hands-on Denial of Service Lab Exercises Using Slowloris and RUDY, In the Proceedings of the 2012 Information Security Curriculum Development Conference, pp. 21--29. Google ScholarDigital Library
- Cook T., Conti G., and Raymond D. (2012). When Good Ninjas Turn bad: Preventing Your Students from becoming the Threat. Proceedings of the 16th Colloquium for Information System Security Education, pp. 61--67.Google Scholar
- Harris, J. Maintaining ethical standards for computer security curriculum. In InfoSecCD'04: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, pages 46--48, New York, NY, USA, 2004, ACM Press. Google ScholarDigital Library
Index Terms
- A Smartphone App for Enhancing Students' Hands-on Learning on Network and DoS Attacks Traffic Generation
Recommendations
Android based mobile apps for information security hands-on education
As mobile devices grow increasingly in popularity within the student community, novel educational activities and tools, as well as learning approaches can be developed to get benefit from this prevalence of mobile devices (e.g. mobility and closeness to ...
Detecting repackaged smartphone applications in third-party android marketplaces
CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and PrivacyRecent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone applications. These smartphone applications (or apps), typically organized ...
Smartphone Energy Drain in the Wild: Analysis and Implications
SIGMETRICS '15: Proceedings of the 2015 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer SystemsThe limited battery life of modern smartphones remains a leading factor adversely affecting the mobile experience of millions of smartphone users. In order to extend battery life, it is critical to understand where and how is energy drain happening on ...
Comments