A Flexible Laboratory Environment Supporting Honeypot Deployment for Teaching Real-World Cybersecurity Skills

被引:10
作者
Eliot, Neil [1 ]
Kendall, David [1 ]
Brockway, Michael [1 ]
机构
[1] Northumbria Univ, Dept Comp & Informat Sci, Newcastle Upon Tyne NE1 8ST, Tyne & Wear, England
关键词
Cybersecurity; network security; honeypot; teaching; NETWORK; DESIGN;
D O I
10.1109/ACCESS.2018.2850839
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the practical study of cybersecurity, students benefit greatly from having a full control of physical equipment and services. However, this presents far too great a risk to security to be permitted on university campus networks. This paper describes an approach, used successfully at Northumbria University, in which students have control of an off-campus network laboratory, with a dedicated connection to the Internet. The laboratory is flexible enough to allow the teaching of general purpose networking and operating systems courses, while also supporting the teaching of cybersecurity through the safe integration of honeypot devices. In addition, this paper gives an analysis of honeypot architectures and presents two in detail. One of these offers students the opportunity to study cybersecurity attacks and defences at very low cost. It has been developed as a stand-alone device that can also be integrated safely into the laboratory environment for the study of more complex scenarios. The main contributions of this paper are the design and implementation of an off-campus, physical network laboratory; a small, low-cost, configurable platform for use as a "light-weight" honeypot; and a laboratory-based, multi-user honeypot for large-scale, concurrent, cybersecurity experiments. This paper outlines how the laboratory environment has been successfully deployed within a university setting to support the teaching and learning of cybersecurity. It highlights the type of experiments and projects that have been supported and can be supported in the future.
引用
收藏
页码:34884 / 34895
页数:12
相关论文
共 49 条
[31]  
Offensive Security, 2017, KAL LIN PEN TEST ETH
[32]  
Oracle Inc., 2017, OR VM VIRTUALBOX
[33]  
Pandey A, 2016, PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, P3487
[34]  
Rapid 7, 2017, MET PENTR TEST SOFTW
[35]  
Raspberry Pi Foundation, 2017, PROD RASPB PI
[36]  
Rubicon Communications LLC., 2018, PFSENSE FIR
[37]  
Rupal RD, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), P1240, DOI 10.1109/RTEICT.2016.7808030
[38]   Scalable Honeypot Architecture for Identifying Malicious Network Activities [J].
Sadasivam, Gokul Kannan ;
Hota, Chittaranjan .
2015 2ND INTERNATIONAL CONFERENCE ON EMERGING INFORMATION TECHNOLOGY AND ENGINEERING SOLUTIONS (EITES 2015), 2015, :27-31
[39]   Teaching Cybersecurity Using the Cloud [J].
Salah, Khaled ;
Hammoud, Mohammad ;
Zeadally, Sherali .
IEEE TRANSACTIONS ON LEARNING TECHNOLOGIES, 2015, 8 (04) :383-392
[40]  
Sankar R., 2015, HYDRAGTK ONLINE ATTA