The NSF Grantees’ Poster Session at American Society for Engineering Education’s Annual Conference is to provide a high visibility venue to disseminate results and interact with colleagues in the engineering education field. In this coming session, we plan on sharing our elaborated cybersecurity labs.
In our past teaching for different cybersecurity courses and workshops, we have developed a broad range of hands-on labs. Our readily-available labs are conducted in our own pre-built virtual machine image as we have installed all the necessary tools, software, and libraries that are needed by this type of security and cryptography labs. Students just need to download our provided VM and run it on their own computers using VirtualBox (or VMWare).
Our developed labs have been ported to the latest version of Ubuntu18.04 VM. These labs mainly focus on network security (cover topics on network security, ranging from attacks on TCP/IP and DNS to various network security technologies such as, Firewall, VPN, and IPSec), web security (cover some of the most common vulnerabilities in web applications in order to show students how attacks work through exploiting these vulnerabilities), applied cryptography (cover three essential concepts in cryptography, including secrete-key encryption, one-way hash function, and public-key encryption and PKI), and mobile security (target the smartphone security through covering the most common vulnerabilities and attacks on mobile devices).
Over and above, we have ported some of these developed labs to the Global Environment for Network Innovations (GENI), an NSF-funded federated and real-world testbed that provides a virtual laboratory for networking and distributed systems research and education. It is well suited for exploring network security aspects, thereby promoting innovations in network security, services, and applications. The advantage of deploying GENI for network and computer security education is allowing experimenters to have access to different computing resources from locations around the United States, connect computing resources in topologies best suited to network and security experiments, and install custom software or even custom operating systems on these computing resources. The labs that are fitted to GENI were significantly revised and modified in order to be applicable on such a real-world testbed.
Are you a researcher? Would you like to cite this paper? Visit the ASEE document repository at peer.asee.org for more tools and easy citations.