{"title":"Innovative Teaching and Learning Experiences in Network Attacks and Defense","authors":"Weimin Wei, Liping Sun","doi":"10.1109/CIS.2012.137","DOIUrl":null,"url":null,"abstract":"Network attacks and defense, as a core lesson in the field of the information security, introduce a kind of educational method called situational teaching which separate attacking roles as well as defending ones apart dividing this course into 12 subjects: scanning, network sniffing, password cracker, spoofing attacks, DOS (Denial of Services), buffer overflows, Web attacks, SQL (Structured Query Language) injection, Trojan-horse, computer virus, mobile phone virus, firewall as well as intrusion detection, each group containing 6 students have one task, half of whom belong to the attacking fields while the remaining should work on the opposite side. We sincerely hope that through this practice students' comprehensive capability including practical ability, self-learning ability and how to solve, analyze one problem as well as to get along with others can be improved to some extent.","PeriodicalId":294394,"journal":{"name":"2012 Eighth International Conference on Computational Intelligence and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Eighth International Conference on Computational Intelligence and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIS.2012.137","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Network attacks and defense, as a core lesson in the field of the information security, introduce a kind of educational method called situational teaching which separate attacking roles as well as defending ones apart dividing this course into 12 subjects: scanning, network sniffing, password cracker, spoofing attacks, DOS (Denial of Services), buffer overflows, Web attacks, SQL (Structured Query Language) injection, Trojan-horse, computer virus, mobile phone virus, firewall as well as intrusion detection, each group containing 6 students have one task, half of whom belong to the attacking fields while the remaining should work on the opposite side. We sincerely hope that through this practice students' comprehensive capability including practical ability, self-learning ability and how to solve, analyze one problem as well as to get along with others can be improved to some extent.