Intro Cyber Security Labs on GENI

Slides:



Advertisements
Similar presentations
Network Vulnerabilities and Attacks Dr. John Abraham UTPA.
Advertisements

Distance Education Team 1 Adrian Sia Xavier Appé Anoop Georges Salvador Gonzales Augustine Ani Zijian Cao Joe Ondercin SNA Step 3 November 14, 2001.
Lecture 9 Page 1 CS 236 Online Denial of Service Attacks that prevent legitimate users from doing their work By flooding the network Or corrupting routing.
Hands-On Ethical Hacking and Network Defense Second Edition Chapter 5 Port Scanning.
Sponsored by the National Science Foundation Lab Zero: A First Experiment.
Security (Continued) V.T. Raja, Ph.D., Oregon State University.
Network Attacks Mark Shtern.
Simulation and Analysis of DDos Attacks Poongothai, M Department of Information Technology,Institute of Road and Transport Technology, Erode Tamilnadu,
A Framework for Classifying Denial of Service Attacks Alefiya Hussain, John Heidemann and Christos Papadopoulos presented by Nahur Fonseca NRG, June, 22.
Scanning February 23, 2010 MIS 4600 – MBA © Abdou Illia.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Information Networking Security and Assurance Lab National Chung Cheng University Backdoors and Remote Access Tools INSA Laboratory.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
In-Band Detection of Virtual Machines Estefan Ortiz & Cory Hayes Computer Science and Engineering Graduate Operating Systems December 16,
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Sponsored by the National Science Foundation A Virtual Computer Networking Lab Mike Zink, Max Ott, Jeannie Albrecht GEC 23, June 16 th 2015.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Project Idea #1 Project: Simulation in NS Learn how to use NS-2 Examine 2-3 papers that do benchmark studies Implement a simulation of the Drexel TAARP.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Team Member: Xinjie Guan, University of Missouri Kansas City; Xili Wan, University of Missouri Kansas City; Ruiling Gao, Tufts University; Date: June 2,
DISTRIBUTED tcpdump CAPABILITY FOR LINUX Research Paper EJAZ AHMED SYED Dr. JIM MARTIN Internet Research Group. Department Of Computer Science – Clemson.
Sponsored by the National Science Foundation Lab Zero: A First Experiment using GENI Sarah Edwards, GENI Project Office.
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
Sponsored by the National Science Foundation Lab Zero: A First Experiment using GENI.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Department of Information Engineering1 About your assignment 5 -layers Model Application Layer(HTTP, DNS,...) TCP Layer(add sequence number to packets)
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking Author : Tommy Chin Jr., Xenia Mountrouidou, Xiangyang Li and Kaiqi.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Hacking 101, Boot-camp Computer Security Group March 10, 2010 Mitchell Adair.
Denial of Service detection and mitigation on GENI
[blank page for bug work-around]
Penetration Testing Exploiting I: Password Cracking
Mininet and Openflow Labs
Virtual Machine and VirtualBox
Traffic Analysis– Wireshark Simple Example
GENI, Pen Testing, & other stories
Denial of Service detection and mitigation on GENI
Cybersecurity + Liberal Arts Workshop
GENI, Cybersecurity, and Liberal Arts
Intrusion Detection Systems
Xenia Mountrouidou (Dr. X)
CITA 352 Chapter 5 Port Scanning.
ECE 544: Middlebox lab Abhigyan Sharma.
Daniel Kouril, Ivo Nutar Masaryk University
ECE544: Software Assignment 3
Spoofing Basics Presentation developed by A.F.M Bakabillah Cyber Security and Networking Consultant MCSA: Messaging, MCSE RHCE ITIL CEH.
CyberPaths Interdisciplinary Modules
Chapter 2. Malware Analysis in VMs
INSTALLING AND SETTING UP APACHE2 IN A LINUX ENVIRONMENT
Lab 2: TCP IP Attacks ( Indirect)
Intro to Denial of Serice Attacks
CS 39006: Computer Networks Lab – Day 1
What Makes a Network Vulnerable?
Delivering Distance Learning Experiments in Local Area Networking
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
Traffic Analysis– Wireshark Simple Example
Virtual Machine and VirtualBox
TCP Protocol Analysis Access UMKC Home Page.
Intro Cyber Security Labs on GENI
COVERT STORAGE CHANNEL MODULE
TCP Protocol Analysis Access UMKC Home Page.
Introduction An introduction to the organization of the Networks Course and the Internet Lab.
Office 365 Performance Management
COVERT STORAGE CHANNEL MODULE
Intrusion Detection Systems
CyberPaths Interdisciplinary Modules
IS 4506 Configuring the FTP Service
Presentation transcript:

Intro Cyber Security Labs on GENI Xenia Mountrouidou (Dr. X)

Outline Start reserving your topology Intro Labs: DDoS, Passwords, Ransomware Learning Goals Audience Background Variations

Reserve topology All labs can be found in: http://blogs.cofc.edu/cyberpaths/modules/ Go to: https://goo.gl/OuDw8M Use RSpec http://mountrouidoux.people.cofc.edu/Cyb erPaths/files/denialOfServiceLevel1.txt Change Clemson to some other aggregate

Learning Goals Apply IT components knowledge Produce network traffic - DDoS Hypothesize about effects of network attack- DDoS Create and analyze a network attack- DDoS Understand password complexity - passwords Apply password cracking tools – passwords Experience the effects of ransomware – ransomware Reverse engineer a simple ransomware script

Audience Freshmen, Sophomores Non-CS and CS majors Some background work is needed

Background IT Components Computer Networks Command Line GENI DDoS Password Theory Ransomware & Malware

Denial of Service Lab for non-CS Majors Pre-installed topology ping - verification iperf - performance Hping3 - DoS Hypothesis testing Experiments on GENI GENI: Virtual laboratory for networking and distributed systems research and education

DDoS TCP SYN Flood Insights: Traffic pattern Spoofed IPs Send Spoofed SYN Send SYN-ACK Resend SYN-ACK Attacker Server Spoofed Client Insights: Traffic pattern Spoofed IPs

Passwords Scenario based exercise Pivot through VMs Crack passwords Using online tools Use Linux tools – hydra, John the Ripper Instructor may need to setup topologies

Ransomware Reverse engineer python script Instructor sets up topologies wget the zip file linked in the page and and unzip

Questions? Let’s experiment!

Useful source: FYE Security 101 site: http://mountrouidoux.people.cofc.edu/fye_cysec/index.html