{"title":"网络攻击与防御训练:以模拟器为平台","authors":"C. Kuo, Kai Chain, Chu-Sing Yang","doi":"10.24507/IJICIC.14.06.2245","DOIUrl":null,"url":null,"abstract":". Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intru-sions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.","PeriodicalId":50314,"journal":{"name":"International Journal of Innovative Computing Information and Control","volume":"54 1","pages":"2245-2258"},"PeriodicalIF":1.3000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Cyber attack and defense training: Using emulab as a platform\",\"authors\":\"C. Kuo, Kai Chain, Chu-Sing Yang\",\"doi\":\"10.24507/IJICIC.14.06.2245\",\"DOIUrl\":null,\"url\":null,\"abstract\":\". Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intru-sions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.\",\"PeriodicalId\":50314,\"journal\":{\"name\":\"International Journal of Innovative Computing Information and Control\",\"volume\":\"54 1\",\"pages\":\"2245-2258\"},\"PeriodicalIF\":1.3000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Innovative Computing Information and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.24507/IJICIC.14.06.2245\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Innovative Computing Information and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.24507/IJICIC.14.06.2245","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Cyber attack and defense training: Using emulab as a platform
. Although the convenience of the Internet has changed contemporary society, lifestyles, and interpersonal communications, it has also enabled various network intru-sions that attempt to seize fame or profits through manipulating Internet functionality, computers, software, or the social weaknesses of the users. Attackers have leveraged new technologies and developed new techniques to deploy an endless array of tactics and skills. However, conventional cybersecurity education often relies on classroom teaching instead of practical tasks using real machines, because actual machine practice often provokes attacks or abnormal network traffic. This article used Emulab as a testing platform to provide a controllable environment that enabled quick deployment, adjustment, and measurement of both offensive and defensive cybersecurity experiments. Through the integration of cyber-attack and defense maneuvers within predetermined scenarios, as well as related cybersecurity questions, this article compiled data regarding the operations and responses of the participants in the exercises. This enabled analysis and improvement of the attack and defense maneuvers, the scenarios, and the platform.
期刊介绍:
The primary aim of the International Journal of Innovative Computing, Information and Control (IJICIC) is to publish high-quality papers of new developments and trends, novel techniques and approaches, innovative methodologies and technologies on the theory and applications of intelligent systems, information and control. The IJICIC is a peer-reviewed English language journal and is published bimonthly