ABSTRACT
This paper discussed a virtual network implemented in an intrusion detection and incidence response graduate course at East Carolina University. By using virtualization technology, the virtual network provided students with an experimental learning environment that simulates real world cybersecurity activities. The network included multiple virtual machines (VMs) and they were built inside of Graphical Network Simulator (GNS3) located in a Windows 10 Operating System (OS). Multiple OSs were configured on VMware's vCloud Director (VCD) and each student had his/her own OS after logging in to VCD. Since VCD is accessible via the Internet, students were able to access their learning environments anytime and anywhere in the world. In addition, a survey regarding the learning environment was conducted at the end of the Fall semester in 2017.
- Drolet, M. 2018. What does stolen data cost per second. Retrieved from https://www.csoonline.com/article/3251606/data-breach/what-does-stolen-data-cost-per-second.htmlGoogle Scholar
- Armerding, T. 2018. The 17 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.htmlGoogle Scholar
- IC3: total damage caused by reported cyber crime 2001--2016. (n.d.). Retrieved from https://www.statista.com/statistics/267132/total-damage-caused-by-by-cyber-crime-in-the-us/Google Scholar
- National Centers of Academic Excellence in Cyber Defense. (n.d.). Retrieved from https://www.nsa.gov/resources/educators/centers-academic-excellence/cyber-defense/Google Scholar
- Abler, R.T, Contis, D., Grizzard, J.B. and Owen, H.L. 2006. Georgia Tech Information Security Center Hands-on Network Security Laboratory. IEEE Transactions on Education, 49(1), 82--87. Google ScholarDigital Library
- Nance, K.L and Hay, B. 2006. Evolution of the ASSERT Computer Security Lab. Proceedings of the 9th ACM SIGITE Colloquium for Information Systems Security Education.Google Scholar
- Ho, J. W., Mallesh, N., and Wright M. 2009. The Design and Lessons of the ASCENT Security Teaching Lab. Proceedings of the 13th Colloquium for Information Systems Security Education, Seattle, WA, 124--132.Google Scholar
- Caliskan, E., Tatar, U., Bahsi, H., Ottis, R., and Vaarandi, R. 2017. Capability Detection and Evaluation Metrics for Cyber Security lab Exercises. Proceedings of the International Conference on Cyber Warfare and Security, 407--414.Google Scholar
- Vykopal, J., Vizvary, M., Oslejsek, R, Celeda, P., and Tovarnak, D. 2017. Lessons learned from complex hands-on defence exercises in a cyber range. Proceedings of the IEEE Frontiers in Education Conference (FIE), Indianapolis, IN.Google Scholar
- Yuan, X., Williams, K., Yu, H., Rorrer, A., and Chu, B.T. 2017. Faculty Workshops for Teaching Information Assurance through Hands-On Exercises and Case Studies. Journal of Information Systems Education, 28(1), 11--19.Google Scholar
- Behar-Horenstein, L. S. and Niu, L. 2011. Teaching critical thinking skills in higher education: A review of the literature. Journal of College Teaching & Learning, 8(2).Google ScholarCross Ref
- Kalelioğlu, F. and Gülbahar, Y. 2014. The effect of instructional techniques on critical thinking and critical thinking dispositions in online discussion. Journal of Educational Technology & Society, 17(1).Google Scholar
- Chou, T.S. and Mohammed, T. 2014. Learning Computer Systems' Vulnerabilities Exploitation Through Penetration Test Experiments. Proceedings of the American Society for Engineering Education (ASEE) Gulf-Southwest Conference, New Orleans, Louisiana, 1--6.Google Scholar
Index Terms
- Developing and Evaluating an Experimental Learning Environment for Cyber Security Education
Recommendations
Real user-environment migration between heterogeneous ISA platforms
ICUIMC '12: Proceedings of the 6th International Conference on Ubiquitous Information Management and CommunicationVirtualization technology has recently been widely used due to its various benefits, such as reducing system management efforts and increasing system utilization. Each execution environment can be isolated from other environments as each user can have ...
Performance Analysis of Virtual Machine Introspection Tools in Cloud Environment
ICIA-16: Proceedings of the International Conference on Informatics and AnalyticsVirtual Machine (VM) security is one of the biggest issues with a cloud environment. This issue could be solved with the help of Virtual Machine Introspection (VMI) tools. VMI tools monitor the state of Virtual machine running in the cloud environment. ...
Evaluating and optimizing I/O virtualization in kernel-based virtual machine (KVM)
NPC'10: Proceedings of the 2010 IFIP international conference on Network and parallel computingI/O virtualization performance is an important problem in KVM. In this paper, we evaluate KVM I/O performance and propose several optimizations for improvement. First, we reduce VM Exits by merging successive I/O instructions and decreasing the ...
Comments