Abstract
Providing computer security laboratory exercises enables students to experience and understand the underlying concepts associated with computer security, but there are many impediments to the creation of realistic exercises of this type. Virtualization provides a mechanism for creating and deploying authentic computer security laboratory experiences for students while minimizing the associated configuration time and reducing the associated hardware requirements. This paper provides a justification for using virtualization to create and deploy computer security lab exercises by presenting and discussing examples of applied lab exercises that have been successfully used at two leading computer security programs. The application of virtualization mitigates many of the challenges encountered in using traditional computer laboratory environments for information assurance educational scenarios.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Official Collegiate Cyber Defense Competition Web site (n.d.) Retrieved December 18, 2007 from http://www.nationalccdc.org/
Crosby, S. and Brown, D. The Virtualization Reality. ACM Queue, December/January 2006-2007, pp.34-4
Dumpel.exe. Retrieved from the Microsoft Product Support’s Reporting Tools web site on December 18, 2007 from http://www.microsoft.com/downloads/details.aspx?FamilyID=cebf3c7c-7ca5-408f-88b7-f9c79b7306c0displaylang=en)
Hay, B., K. Nance, and C. Hecker. Evolution of the ASSERT Computer Security Lab. Proceedings of the 10th Colloquium for Information Systems Security Education. Adelphi, MD. June 2006.
Kernel based Virtual Machine. Retrieved November 18, 2007 from http://kvm.qumranet.com/kvmwiki.
Liveview sourceforge website retrieved December 18, 2007 from.http://liveview.sourceforge.net/
lcc-win32 retrieved on December 18, 2007 from http://www.cs.virginia.edu/ lcc-win32/
Microsoft Virtual PC Server. Retrieved July 15 from http://www.microsoft.com/windowsserversystem/virtualserver/
mIRC retrieved on December 18, 2007 from http://www.mirc.com/
Nmap website retrieved December 18, 2007 from http://nmap.org/
Office IRC retrieved on December 18, 2007 from http://www.officeirc.com/
Parallels. Retrieved July 25, 2007 from http://www.parallels.com/
Pmdump website retrieved December 18, 2007 from http://www.ntsecurity.nu/toolbox/pmdump/
Pollitt, M., Nance, K., Hay, B., Dodge, R., Craiger, P., Burke, P., Marberry, C., and Brubaker, B. Virtualization and Digital Forensics: A Research and Education Agenda in Journal of Digital Forensic Practice. Taylor and Francis, Philadelphia, PA.
psloglist retrieved from the Microsoft sysinternals web site on December 18, 2007 from http://technet.microsoft.com/en-us/sysinternals/default.aspx
QEMU (nd) Open Source Process Emulator. Retrieved on November 18, 2007 from http://fabrice.bellard.free.fr/qemu/.
Rosenblum, M. (2004) The Reincarnation of Virtual Machines. ACM Queue. July/August 2004 ACM.
Snort website retrieved December 18, 2007 from http://www.snort.org/
TCPdump website retrieved December 18, 2007 from http://www.tcpdump.org/
VMware. Retrieved November 18, 2007 from http://www.vmware.com.
Winhex website retrieved December 18, 2007 from http://www.winhex.com/winhex/
Wireshark website retrieved December 18, 2007 from http://www.wireshark.org/
Xensource. Retrieved July 27, 2007 from http://www.xensource.com/xen/xen/nfamily/virtualpc/default.mspx
CentOS. Retrieved December 17, 2007 from http://www.centos.org/modules/tinycontent/index.php?id=15
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Hay, B., Dodge, R., Nance, K. (2008). Using Virtualization to Create and Deploy Computer Security Lab Exercises. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_40
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_40
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)