Using an isolated network laboratory to teach advanced networks and security
Proceedings of the thirty-second SIGCSE technical symposium on Computer Science Education
The IWAR range: a laboratory for undergraduate information assurance education
CCSC '01 Proceedings of the sixth annual CCSC northeastern conference on The journal of computing in small colleges
A laboratory-based course on internet security
SIGCSE '03 Proceedings of the 34th SIGCSE technical symposium on Computer science education
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Design, deployment, and use of the DETER testbed
DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
Hi-index | 0.00 |
Historical research of intrusion, anomaly, or rogue software detection, and network protection techniques to prevent Denial of Service, or other malicious software attacks, have involved antiquated singularly scoped techniques. Malicious software attacks, whether in the form of worms, spyware, malware, or computer viruses, have economically and productively impacted the state of information exchange throughout the interconnected world. The ability to proactively identify the threats or unauthorized activity that contradicts day-today activities, will allow initiation of defenses before a full threat infestation occurs. This paper describes a test networked system that has been built for our research projects involving Internet worm detection. The goal of the system is to simulate a global network containing heterogeneous systems; in turn, we may study the behaviors of various worms and to design effective strategies for predicting, detecting, and quarantining outbreaks.