V-NetLab: A Cost-Effective Platform to Support Course Projects in Computer Security

نویسندگان

  • Kumar Krishna
  • Weiqing Sun
  • Pratik Rana
  • Tianning Li
چکیده

Network and computer courses need dedicated laboratories for students to carry out hands-on assignments and course projects. Typically, these projects require each student to be given administrative access to an entire, isolated network of computers. The obvious approach of creating one dedicated physical network for each student is prohibitively expensive, both in terms of hardware costs, as well as the management overhead in setting up and administering these networks. We have therefore developed a platform where logically isolated virtual networks of computers can be set up very easily. The platform greatly simplifies administration of virtual networks by automating the startup and shutdown of these networks. In addition, our platform simplifies customization of the configurations of different computers on a virtual network, and moreover, provides features to permute these configurations across different student groups. A novelty of our approach is that these networks are realized on a modest size physical networks consisting of commodity PCs. In our experiments to date, classes of 50 students have been supported with a hardware platform costing under $30K, where each student has access to a dedicated, logical network of 6 to 8 (virtual) computers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

V-NetLab: An Approach for Realizing Logically Isolated Networks for Security Experiments

Cyber security experiments with potentially malicious software can possibly damage the testbed environment and “escape” into the Internet. Due to this security concern, networks used in such experiments are often totally isolated from production networks and the Internet. This choice, however, precludes remote access to testbeds used for security experiments, thus requiring costly duplication o...

متن کامل

An e-health driven laboratory information system to support HIV treatment in Peru: E-quity for laboratory personnel, health providers and people living with HIV

BACKGROUND Peru has a concentrated HIV epidemic with an estimated 76,000 people living with HIV (PLHIV). Access to highly active antiretroviral therapy (HAART) expanded between 2004-2006 and the Peruvian National Institute of Health was named by the Ministry of Health as the institution responsible for carrying out testing to monitor the effectiveness of HAART. However, a national public health...

متن کامل

A Model-Driven Decision Support System for Software Cost Estimation (Case Study: Projects in NASA60 Dataset)

Estimating the costs of software development is one of the most important activities in software project management. Inaccuracies in such estimates may cause irreparable loss. A low estimate of the cost of projects will result in failure on delivery on time and indicates the inefficiency of the software development team. On the other hand, high estimates of resources and costs for a project wil...

متن کامل

Low Cost UAV-based Remote Sensing for Autonomous Wildlife Monitoring

In recent years, developments in unmanned aerial vehicles, lightweight on-board computers, and low-cost thermal imaging sensors offer a new opportunity for wildlife monitoring. In contrast with traditional methods now surveying endangered species to obtain population and location has become more cost-effective and least time-consuming. In this paper, a low-cost UAV-based remote sensing platform...

متن کامل

Self authentication path insertion in FPGA-based design flow for tamper-resistant purpose

FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005