Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity Education Yang Yu
Tools for Cyber Security Education Why do we need experiment tools for Cybersecurity Education? We need to know the hacker’s tool. Get familiar with the relative operations. Other available tools and their limitations: Computer lab: very high maintenance cost. Virtual Machine: very high hardware requirement. Our choice: The DeterLab!
Introduction “Emulab-based cluster testbed for cybersecurity research and education” Funded by NSF and Dept. of Homeland Security Hosted by USC and UC Berkeley Provides experimental infrastructure for next-generation cybersecurity technologies Contains software that controls a pool of experimental nodes interconnected with high-speed links Experiments can be defined, performed and monitored remotely
Why do we use DeterLab in our class? It is developed by the university as an education tool. So it fit our teaching object with low maintenance cost. It provides detailed instructions and teaching manuals. It is cloud based testbed and remotely accessible. It allows students to do the experiment on their computers regardless of the location limits. It is safe to do the dangerous operation within the setup closed test-bed system.
How does it work ? Deter Software loads OS images onto the free nodes available on test bed. VLANs are created with newly created image nodes as the topology mentioned by the user. After successful configuration, Deter runs specified scripts and provides a live network with real machines to the user for accessing via internet.
Deter Projects Deter Projects - Public Shared Materials Introduction to DETERLab MITM ARP Poisoning Man-in-the-middle attacks Denial of service Computer Forensics OS Hardening DNS Hijacking
My DeterLab
Example: Denial of service (1) How the TCP SYN Flood Attack Works
Example: Denial of service (2) How the TCP SYN Flood Attack Works
Example: Denial of service (3) How the TCP SYN Flood Attack Works The traffic when SYN cookie stops
Example: Denial of service (4) How the TCP SYN Flood Attack Works The traffic when SYN cookie starts
DDOS attacks
Useful Links - References
Queries !!!