Developing a Hybrid Virtualization Platform Design for Cyber Warfare Training and Education Thesis

نویسنده

  • Kyle E. Stewart
چکیده

Virtualization is a technique used to model and simulate the cyber domain, as well as train and educate. Different types of virtualization techniques exist that each support a unique set of benefits and requirements. This research proposes a novel design that incorporates host and network virtualization concepts for a cyber warfare training platform. At the host level, hybrid virtualization combines full and operating system virtualization techniques in order to leverage the benefits and minimize the drawbacks of each individual technique. Network virtualization allows virtual machines to connect in flexible topologies, but it also incurs additional processing overhead. Quantitative analysis falls into two sets of experiments. The first set of experiments evaluates traditional virtualization techniques against the hybrid approach. Results indicate that in some cases, performance of hybrid virtualization exceeds that of full virtualization alone while still providing an identical feature set. The second set of experiments examines the amount of overhead involved with network virtualization with respect to bandwidth and latency. Results indicate that performance over a local area network incurs two to four times the performance cost compared to physical connections. The benefit of this additional overhead is an increased flexibility in defining network topologies at the software level independent of the underlying physical topology.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Information Warfare in the Trenches

With the increased potential of a bona fide cyber terrorist attack and the possibility of a future “war in the wires”, we must continue to improve the education and training of individuals responsible for defending our national borders—whether those borders are physical or electronic. The Information Analysis and Research (IWAR) laboratory at the United States Military Academy (USMA) has proven...

متن کامل

Creating a cyber moving target for critical infrastructure applications using platform diversity

Despite the significant effort that often goes into securing critical infrastructure assets, many systems remain vulnerable to advanced, targeted cyber attacks. This paper describes the design and implementation of the Trusted Dynamic Logical Heterogeneity System (TALENT), a framework for live-migrating critical infrastructure applications across heterogeneous platforms. TALENT permits a runnin...

متن کامل

Modeling and Integrating Cognitive Agents Within the Emerging Cyber Domain

One of the elements missing from virtual environments in the emerging cyber domain is an element of active opposition. For example, in a training simulation the instructor assigns the student a task or objective, and the student then practices within the environment (the “cyber range”) until they feel comfortable with the task or are able to demonstrate the requisite level of mastery. The envir...

متن کامل

Creating a Cyber Moving Target for Critical Infrastructure Applications

Despite the significant amount of effort that often goes into securing critical infrastructure assets, many systems remain vulnerable to advanced, targeted cyber attacks. This paper describes the design and implementation of the Trusted Dynamic Logical Heterogeneity System (TALENT), a framework for live-migrating critical infrastructure applications across heterogeneous platforms. TALENT permit...

متن کامل

Cyber Medical Education: Beyond the Integration of Concepts in Technology-based Learning

Introduction: Along with the transition from the digital era to the era of cyber-technology, medical professionals have been forced to use different conceptual systems to meet their informational and communicational needs. These emerging scientific concepts each have specific meaning which should be redefined in their own context so that they could be utilized in the conceptual systems of speci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010