V-isoNet: A Virtualised and Isolated Network using Open Source Technologies

نویسندگان

  • Michael Gleeson
  • David Markey
  • Fredrick Mtenzi
چکیده

Computer Security and Forensics is an emerging academic discipline in which there are many challenges facing educational institutions in teaching, from both an educational and technical perspective. The School of Computing in Dublin Institute of Technology offers two Security and Forensic Computing modules, a 4th year BSc (Hons) module and an MSc module. Currently the BSc module requires a practical section to the course while the MSc module does not require practical work. In order to aid teaching during the next semester, both sets of students will be exposed to a Security and Forensics practical laboratory. This series of research proposes a phased approach to design and establish a suitable overall environment to provide a comprehensive Computer Security and Forensics practical laboratory. The three identifi able components are (1) an isolated networked environment, (2) an exposed repository to be used to demonstrate vulnerabilities and (3) the formation of a Security and Forensics toolkit to be used in conjunction with the isolated network environment and the exposed repository. This fi rst paper, in a series of three, will introduce the reader to the overall research objective. It will then focus on research and development of the fi rst identifi ed component, namely an isolated network environment.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Isolated Virtualised Clusters: Testbeds for High-Risk Security Experimentation and Training

Adequate testbeds for conducting security experiments and test under controlled, safe, repeatable and asrealistic-as-possible conditions, are a key element for the research and development of adequate security solutions and the training of security personnel and researchers. In this paper, we report on the construction and operations of isolated virtualised testbeds used in two separate securit...

متن کامل

Realtime High-Speed Network Traffic Monitoring Using ntopng

Monitoring network traffic has become increasingly challenging in terms of number of hosts, protocol proliferation and probe placement topologies. Virtualised environments and cloud services shifted the focus from dedicated hardware monitoring devices to virtual machine based, software traffic monitoring applications. 
 This paper covers the design and implementation of ntopng, an open-source t...

متن کامل

Characterization and Kinetic study of PAH–degrading Sphingopyxis ummariensis bacteria isolated from a petrochemical wastewater treatment plant

The expansion of a microbial bank for the degradation of polycyclic aromatic hydrocarbons (PAHs) is crucial for removal of these persistent pollutants. In this study, five gram-negative, aerobic, non-fermentative bacterial strains (III-R3, IV-P11, IV-P13, IV-R13, and V-P18) were isolated from the activated sludge of a petrochemical wastewater treatment plant using enrichment pro­ tocol based on...

متن کامل

Composable Services Architecture for Dynamically Configurable Virtualised Infrastructure Services Provisioning

Effective use of existing network and IT infrastructure can be achieved by providing combined network and IT resources on-demand as infrastructure services that are capable of supporting complex scientific experiments, technological processes, and collaborative groups of researchers and applications. The paper provides a short overview of the existing standards and technologies and refers to th...

متن کامل

PASSIVE: Policy-Assessed System-Level Security of Sensitive Information Processing in Virtualised Environments

Virtualised service platforms and cloud computing hold great promise for delivery of large applications in eGovernment. However, to date, the fundamental shared-resource nature of virtualisation technologies has raised legitimate security concerns for Government and other organisations with duties to protect confidential data.\nThe PASSIVE project proposes an improved model of security for such...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDIM

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2010