Download presentation
Presentation is loading. Please wait.
Published byPhoebe Cox Modified over 9 years ago
1
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity Education Yang Yu
2
Tools for Cyber Security Education Why do we need experiment tools for Cybersecurity Education? We need to know the hacker’s tool. Get familiar with the relative operations. Other available tools and their limitations: Computer lab: very high maintenance cost. Virtual Machine: very high hardware requirement. Our choice: The DeterLab!
3
Introduction “Emulab-based cluster testbed for cybersecurity research and education” Funded by NSF and Dept. of Homeland Security Hosted by USC and UC Berkeley Provides experimental infrastructure for next-generation cybersecurity technologies Contains software that controls a pool of experimental nodes interconnected with high-speed links Experiments can be defined, performed and monitored remotely http://deter-project.org/about_deter_project
4
Why do we use DeterLab in our class? It is developed by the university as an education tool. So it fit our teaching object with low maintenance cost. It provides detailed instructions and teaching manuals. It is cloud based testbed and remotely accessible. It allows students to do the experiment on their computers regardless of the location limits. It is safe to do the dangerous operation within the setup closed test-bed system.
5
How does it work ? Deter Software loads OS images onto the free nodes available on test bed. VLANs are created with newly created image nodes as the topology mentioned by the user. After successful configuration, Deter runs specified scripts and provides a live network with real machines to the user for accessing via internet.
6
Deter Projects Deter Projects - Public Shared Materials https://education.deterlab.net/course/view.php?id=12 Introduction to DETERLab MITM ARP Poisoning Man-in-the-middle attacks Denial of service Computer Forensics OS Hardening DNS Hijacking
7
My DeterLab
8
Example: Denial of service (1) How the TCP SYN Flood Attack Works
9
Example: Denial of service (2) How the TCP SYN Flood Attack Works
10
Example: Denial of service (3) How the TCP SYN Flood Attack Works The traffic when SYN cookie stops
11
Example: Denial of service (4) How the TCP SYN Flood Attack Works The traffic when SYN cookie starts
12
DDOS attacks http://www.scmagazineuk.com/github-attack--evidence-points-to-china/article/406567/
13
Useful Links - References http://deter-project.org/about_deter_project https://trac.deterlab.net/wiki/DETERSSH https://education.deterlab.net/course/view.php?id=12 https://education.deterlab.net/DETERintro/DETERintro.html https://www.youtube.com/watch?v=8ZC-hgG64tk
14
Queries !!!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.