Cyber attack and defense training: Using emulab as a platform

Cheng Chung Kuo, Kai Chain, Chu-Sing Yang

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intrusions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.

Original languageEnglish
Pages (from-to)2245-2258
Number of pages14
JournalInternational Journal of Innovative Computing, Information and Control
Volume14
Issue number6
DOIs
Publication statusPublished - 2018 Dec 1

Fingerprint

Attack
Internet
Profitability
Scenarios
Teaching
Education
Network Traffic
Exercise
Profit
Communication
Adjustment
Testing
Experiments
Experiment
Training
Skills

All Science Journal Classification (ASJC) codes

  • Software
  • Theoretical Computer Science
  • Information Systems
  • Computational Theory and Mathematics

Cite this

@article{12e12d0094bc4a1883db329107f6c937,
title = "Cyber attack and defense training: Using emulab as a platform",
abstract = "Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intrusions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.",
author = "Kuo, {Cheng Chung} and Kai Chain and Chu-Sing Yang",
year = "2018",
month = "12",
day = "1",
doi = "10.24507/ijicic.14.06.2245",
language = "English",
volume = "14",
pages = "2245--2258",
journal = "International Journal of Innovative Computing, Information and Control",
issn = "1349-4198",
publisher = "IJICIC Editorial Office",
number = "6",

}

Cyber attack and defense training : Using emulab as a platform. / Kuo, Cheng Chung; Chain, Kai; Yang, Chu-Sing.

In: International Journal of Innovative Computing, Information and Control, Vol. 14, No. 6, 01.12.2018, p. 2245-2258.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Cyber attack and defense training

T2 - Using emulab as a platform

AU - Kuo, Cheng Chung

AU - Chain, Kai

AU - Yang, Chu-Sing

PY - 2018/12/1

Y1 - 2018/12/1

N2 - Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intrusions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.

AB - Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intrusions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.

UR - http://www.scopus.com/inward/record.url?scp=85055125155&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85055125155&partnerID=8YFLogxK

U2 - 10.24507/ijicic.14.06.2245

DO - 10.24507/ijicic.14.06.2245

M3 - Article

AN - SCOPUS:85055125155

VL - 14

SP - 2245

EP - 2258

JO - International Journal of Innovative Computing, Information and Control

JF - International Journal of Innovative Computing, Information and Control

SN - 1349-4198

IS - 6

ER -