Automatic Generation Of Virtual Machines For Security Training

被引:1
|
作者
Sanchez, M. [1 ]
Lopez, G. [2 ]
Martinez, J. J. [3 ]
机构
[1] Inst Nacl Tecn Aeroespacial, Madrid, Spain
[2] Univ Alcala, Ingn Informat, Madrid, Spain
[3] Univ Alcala, Area Ciencias Computac & Inteligencia Artificial, Madrid, Spain
关键词
Cybersecurity; Cyber Exercise; Capture the Flag; Virtual Machines; Security Training;
D O I
10.1109/TLA.2016.7555257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work studies the applicability of configuration management tools, to design and develop practical challenges inside the cybersecurity field. Through the tools called Puppet and Packer, a series of templates have been developed that allow to generate a tests scenario. This scenario has been developed to include vulnerable services and security measures already implemented. From this scenario, the flexibility of the solution and the time savings achieved have been evaluated. Through this evaluation it has been determined that the use of this tool is a viable option for developing scenarios both small scale focused on teaching field and big scale used in cybersecurity events.
引用
收藏
页码:2795 / 2800
页数:6
相关论文
共 50 条
  • [11] Virtual Security Appliances: The Next Generation Security
    Rebahi, Yacine
    Hohberg, Simon
    Shi, Lijuan
    Parreira, Bruno Miguel
    Kourtis, Anastasios
    Comi, Paolo
    Ramos, Aurora
    2015 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, MANAGEMENT AND TELECOMMUNICATIONS (COMMANTEL), 2015, : 103 - 110
  • [12] AUTOMATIC-GENERATION OF CONTROL DATA FOR AUTOMATIC INSERTION MACHINES
    SCHMID, KH
    F&M-FEINWERKTECHNIK & MESSTECHNIK, 1991, 99 (05): : 197 - 199
  • [13] Demo Paper: Automatic Provisioning, Deploy and Monitoring of Virtual Machines based on Security Service Level Agreement in the Cloud
    Ullah, Kazi Wali
    Ahmed, Abu Shohel
    2014 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2014, : 536 - 537
  • [14] A Virtual World Grammar for automatic generation of virtual worlds
    Trescak, Tomas
    Esteva, Marc
    Rodriguez, Inmaculada
    VISUAL COMPUTER, 2010, 26 (6-8): : 521 - 531
  • [15] A Virtual World Grammar for automatic generation of virtual worlds
    Tomas Trescak
    Marc Esteva
    Inmaculada Rodriguez
    The Visual Computer, 2010, 26 : 521 - 531
  • [16] Fast automatic security protocol generation
    Zhou, Hongbin
    Foley, Simon
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (2-3) : 119 - 167
  • [17] A framework for automatic generation of security controller
    Martinelli, Fabio
    Matteucci, Ilaria
    SOFTWARE TESTING VERIFICATION & RELIABILITY, 2012, 22 (08): : 563 - 582
  • [18] Optimal transitional trajectory generation for automatic machines
    Tang, Zhe
    Zhou, Qiang
    Qi, Fang
    Wang, Jianxin
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2016, 12 (2-3) : 104 - 112
  • [19] Automatic Generation of Security Argument Graphs
    Tippenhauer, Nils Ole
    Temple, William G.
    An Hoa Vu
    Chen, Binbin
    Nicol, David M.
    Kalbarczyk, Zbigniew
    Sanders, William H.
    2014 20TH IEEE PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2014), 2014, : 33 - 42
  • [20] On the Security of Python']Python Virtual Machines: An Empirical Study
    Lin, Xinrong
    Hua, Baojian
    Fan, Qiliang
    2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2022), 2022, : 223 - 234