Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.

Similar presentations


Presentation on theme: "Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity."— Presentation transcript:

1 Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity Education Yang Yu

2 Tools for Cyber Security Education  Why do we need experiment tools for Cybersecurity Education? We need to know the hacker’s tool. Get familiar with the relative operations.  Other available tools and their limitations: Computer lab: very high maintenance cost. Virtual Machine: very high hardware requirement.  Our choice: The DeterLab!

3 Introduction “Emulab-based cluster testbed for cybersecurity research and education”  Funded by NSF and Dept. of Homeland Security  Hosted by USC and UC Berkeley  Provides experimental infrastructure for next-generation cybersecurity technologies  Contains software that controls a pool of experimental nodes interconnected with high-speed links  Experiments can be defined, performed and monitored remotely http://deter-project.org/about_deter_project

4 Why do we use DeterLab in our class?  It is developed by the university as an education tool. So it fit our teaching object with low maintenance cost. It provides detailed instructions and teaching manuals.  It is cloud based testbed and remotely accessible. It allows students to do the experiment on their computers regardless of the location limits. It is safe to do the dangerous operation within the setup closed test-bed system.

5 How does it work ?  Deter Software loads OS images onto the free nodes available on test bed.  VLANs are created with newly created image nodes as the topology mentioned by the user.  After successful configuration, Deter runs specified scripts and provides a live network with real machines to the user for accessing via internet.

6 Deter Projects Deter Projects - Public Shared Materials https://education.deterlab.net/course/view.php?id=12  Introduction to DETERLab  MITM ARP Poisoning  Man-in-the-middle attacks  Denial of service  Computer Forensics  OS Hardening  DNS Hijacking

7 My DeterLab

8 Example: Denial of service (1) How the TCP SYN Flood Attack Works

9 Example: Denial of service (2) How the TCP SYN Flood Attack Works

10 Example: Denial of service (3) How the TCP SYN Flood Attack Works The traffic when SYN cookie stops

11 Example: Denial of service (4) How the TCP SYN Flood Attack Works The traffic when SYN cookie starts

12 DDOS attacks http://www.scmagazineuk.com/github-attack--evidence-points-to-china/article/406567/

13 Useful Links - References http://deter-project.org/about_deter_project https://trac.deterlab.net/wiki/DETERSSH https://education.deterlab.net/course/view.php?id=12 https://education.deterlab.net/DETERintro/DETERintro.html https://www.youtube.com/watch?v=8ZC-hgG64tk

14 Queries !!!


Download ppt "Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity."

Similar presentations


Ads by Google