Automatic Generation Of Virtual Machines For Security Training

被引:1
|
作者
Sanchez, M. [1 ]
Lopez, G. [2 ]
Martinez, J. J. [3 ]
机构
[1] Inst Nacl Tecn Aeroespacial, Madrid, Spain
[2] Univ Alcala, Ingn Informat, Madrid, Spain
[3] Univ Alcala, Area Ciencias Computac & Inteligencia Artificial, Madrid, Spain
关键词
Cybersecurity; Cyber Exercise; Capture the Flag; Virtual Machines; Security Training;
D O I
10.1109/TLA.2016.7555257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work studies the applicability of configuration management tools, to design and develop practical challenges inside the cybersecurity field. Through the tools called Puppet and Packer, a series of templates have been developed that allow to generate a tests scenario. This scenario has been developed to include vulnerable services and security measures already implemented. From this scenario, the flexibility of the solution and the time savings achieved have been evaluated. Through this evaluation it has been determined that the use of this tool is a viable option for developing scenarios both small scale focused on teaching field and big scale used in cybersecurity events.
引用
收藏
页码:2795 / 2800
页数:6
相关论文
共 50 条
  • [1] Virtual machines, virtual security?
    Bellovin, Steven M.
    COMMUNICATIONS OF THE ACM, 2006, 49 (10) : 104 - 104
  • [2] Automatic Generation of Security Compliant (Virtual) Model Views
    Martinez, Salvador
    Fouche, Alexis
    Gerard, Sebastien
    Cabot, Jordi
    CONCEPTUAL MODELING, ER 2018, 2018, 11157 : 109 - 117
  • [3] Real security for virtual machines
    Mattsson, Ulf
    Network Security, 2009, 2009 (04) : 15 - 17
  • [4] Security Architecture for Virtual Machines
    Tupakula, Udaya
    Varadharajan, Vijay
    Bichhawat, Abhishek
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 218 - +
  • [5] Virtual Training in Safety and Security - TUAS Visions for Next Generation Learning
    Luimula, Mika
    Talvitie, Roosa
    Rantalaiho-Kulo, Nina
    5TH CARPE CONFERENCE: HORIZON EUROPE AND BEYOND, 2019, : 258 - 263
  • [6] Security Analysis of Encrypted Virtual Machines
    Hetzelt, Felicitas
    Buhren, Robert
    ACM SIGPLAN NOTICES, 2017, 52 (07) : 129 - 142
  • [7] Integrated Security Architecture for Virtual Machines
    Varadharajan, Vijay
    Tupakula, Udaya
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 140 - 153
  • [8] The Application of Virtual Machines on System Security
    Zhao, Siqin
    Chen, Kong
    Zheng, Weimin
    FOURTH CHINAGRID ANNUAL CONFERENCE, PROCEEDINGS, 2009, : 222 - 229
  • [9] Automatic verification for plural virtual machines patches
    Yamato, Yoji
    2015 SEVENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, 2015, : 837 - 838
  • [10] Automatic generation of virtual prototypes
    Belanovic, P
    Holzer, M
    Knerr, B
    Rupp, M
    Sauzon, G
    15TH IEEE INTERNATIONAL WORKSHOP ON RAPID SYSTEM PROTOTYPING, PROCEEDINGS: SHORTENING THE PATH FROM SPECIFICATION TO PROTOTYPE, 2004, : 114 - 118