[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

A Virtual Classroom for Cybersecurity Education

  • Chapter
  • First Online:
Transactions on Edutainment XV

Part of the book series: Lecture Notes in Computer Science ((TEDUTAIN,volume 11345))

Abstract

Education in general and cybersecurity education in particular can be made more attractive by adding hands-on experience to classrooms. This requires new technology, such as virtualisation, to be developed fully geared towards the needs of educational purposes. Over the years, several techniques have been developed by the authors. In this paper, the authors first give a full account of their earlier work on a distributed virtual computer lab for cybersecurity education. Then, this virtual lab is extended with educational enhancements, such as an intelligent tutoring system, which resulted in a prototype for a virtual classroom for cybersecurity education.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Netkit, http://wiki.netkit.org, Online, accessed April 2018.

  2. 2.

    The User-mode Linux Kernel Home Page, http://user-mode-linux.sourceforge.net, Online, accessed April 2018.

  3. 3.

    KNOPPIX, http://www.knopper.net/knoppix, Online, accessed April 2018.

  4. 4.

    VMware Player, http://www.vmware.com, Online, accessed April 2018.

  5. 5.

    VirtualBox, http://www.virtualbox.org, Online, accessed April 2018.

  6. 6.

    SWI Prolog, http://www.swi-prolog.org, Online, accessed April 2018.

  7. 7.

    OpenSSL - Cryptography and SSL/TLS Toolkit, https://www.openssl.org, Online, accessed April 2018.

  8. 8.

    GTK+, https://www.gtk.org/, Online, accessed April 2018.

References

  1. Hu, J., Meinel, C., Schmitt, M.: Tele-lab IT security: An architecture for interactive lessons for security education. In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, pp. 412–416. ACM, New York (2004)

    Google Scholar 

  2. Albacete, P.L., VanLehn, K.: The conceptual helper: an intelligent tutoring system for teaching fundamental physics concepts. In: Gauthier, G., Frasson, C., VanLehn, K. (eds.) ITS 2000. LNCS, vol. 1839, pp. 564–573. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45108-0_60

    Chapter  Google Scholar 

  3. Mahdi, A.O., Alhabbash, M.I., Naser, S.S.A.: An Intelligent Tutoring System for Teaching Advanced Topics in Information Security (2016)

    Google Scholar 

  4. Vanlehn, K., et al.: The andes physics tutoring system: lessons learned. Int. J. Artif. Intell. Educ. 15(3), 147–204 (2005)

    Google Scholar 

  5. Hu, J., Schmitt, M., Willems, C., Meinel, C.: A tutoring system for IT security. In: Irvine, C., Armstrong, H. (eds.) Security Education and Critical Infrastructures. ITIFIP, vol. 125, pp. 51–60. Springer, Boston, MA (2003). https://doi.org/10.1007/978-0-387-35694-5_5

    Chapter  Google Scholar 

  6. Corbett, A.T., Koedinger, K.R., Anderson, J.R.: Intelligent tutoring systems. Handb. Hum. Comput. Interact. 5, 849–874 (1997)

    Article  Google Scholar 

  7. Psotka, J., Massey, L.D., Mutter, S.A.: Intelligent Tutoring Systems: Lessons Learned. Psychology Press, Hillsdale (1988)

    Google Scholar 

  8. Melis, E., Siekmann, J.: ActiveMath: an intelligent tutoring system for mathematics. In: Rutkowski, L., Siekmann, J.H., Tadeusiewicz, R., Zadeh, L.A. (eds.) ICAISC 2004. LNCS (LNAI), vol. 3070, pp. 91–101. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24844-6_12

    Chapter  Google Scholar 

  9. Canfield, W.: ALEKS: a web-based intelligent tutoring system. Math. Comput. Educ. 35(2), 152 (2001)

    MathSciNet  Google Scholar 

  10. Yang, F.-J.: A virtual tutor for relational schema normalization. ACM Inroads 2(3), 38–42 (2011)

    Article  Google Scholar 

  11. Kenny, C., Pahl, C.: Automated tutoring for a database skills training environment, vol. 37. ACM (2005)

    Google Scholar 

  12. Suraweera, P., Mitrovic, A.: An intelligent tutoring system for entity relationship modelling. Int. J. Artif. Intell. Educ. 14(3, 4), 375–417 (2004)

    Google Scholar 

  13. Queirós, R.A.P., Leal, J.P.: PETCHA: a programming exercises teaching assistant. In: Proceedings of the 17th ACM Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE 2012, pp. 192–197. ACM, New York (2012)

    Google Scholar 

  14. Sykes, E.R., Franek, F.: A prototype for an intelligent tutoring system for students learning to program in Java (TM). In: Proceedings of the IASTED International Conference on Computers and Advanced Technology in Education, pp. 78–83 (2003)

    Google Scholar 

  15. Vesin, B., Ivanović, M., Klašnja-Milićević, A., Budimac, Z.: Ontology-based architecture with recommendation strategy in java tutoring system. Comput. Sci. Inf. Syst. 10(1), 237–261 (2013)

    Article  Google Scholar 

  16. Jeuring, J., van Binsbergen, L.T., Gerdes, A., Heeren, B.: Model solutions and properties for diagnosing student programs in ask-elle. In: Proceedings of the Computer Science Education Research Conference, CSERC 2014, pp. 31–40. ACM, New York (2014)

    Google Scholar 

  17. Pizzonia, M., Rimondini, M.: Netkit: easy emulation of complex networks on inexpensive hardware. In: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities, TridentCom 2008, pp. 7:1–7:10, ICST, Brussels, Belgium. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2008)

    Google Scholar 

  18. Vranken, H., Koppelman, H.: A virtual computer security lab for distance education. In: Proceedings of the 5th IASTED European Conference on Internet and Multimedia Systems and Applications, EuroIMSA 2009, pp. 21–27. Acta Press (2009)

    Google Scholar 

  19. Colmerauer, A., Roussel, P.: The birth of prolog. In: The Second ACM SIGPLAN Conference on History of Programming Languages, HOPL-II, pp. 37–52. ACM, New York (1993)

    Google Scholar 

  20. Rescorla, E., Modadugu, N.: Datagram transport layer security (2006). http://www.ietf.org/rfc/rfc4347.txt. Accessed 22 July 2014

  21. Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012). http://www.ietf.org/rfc/rfc6347.txt. Accessed 22 July 2014

  22. Dierks, T., Allen, C.: The TLS protocol version 1.0 (1999). http://www.ietf.org/rfc/rfc2246.txt. Accessed 22 July 2014

  23. Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.1 (2006). http://www.ietf.org/rfc/rfc4346.txt. Accessed 22 July 2014

  24. Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2 (2008). http://www.ietf.org/rfc/rfc5246.txt. Accessed 22 July 2014

  25. Wielemaker, J.: Logic programming for knowledge-intensive interactive applications. PhD thesis, University of Amsterdam (2009)

    Google Scholar 

  26. Vranken, H., Haag, J., Horsmann, T., Karsch, S.: A distributed virtual computer security lab. In: Proceedings of the 3rd International Conference on Computer Supported Education, CSEDU 2011, pp. 110–119. SciTePress (2011)

    Google Scholar 

  27. Haag, J., Horsmann, T., Karsch, S., Vranken, H.: A distributed virtual computer security lab with central authority. In: Proceedings of the Computer Science Education Research Conference, CSERC 2011, pp. 89–95. Open Universiteit, Heerlen (2011)

    Google Scholar 

  28. Haag, J., Karsch, S., Vranken, H., Van Eekelen, M.: A virtual computer security lab as learning environment for networking and security courses. In: Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology, CSEIT 2012, pp. 61–68. Global Science & Technology Forum (2012)

    Google Scholar 

  29. Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: Evaluation of students’ learning behaviour and success in a practical computer networking course. In: Proceedings of the 2nd International Conference on E-Learning and E-Technologies in Education, ICEEE 2013, pages 201–206. IEEE (2013)

    Google Scholar 

  30. Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, New York (2003)

    MATH  Google Scholar 

  31. Tanenbaum, A.S.: Computer Networks. Prentice Hall PTR, Upper Saddle River (1985)

    MATH  Google Scholar 

  32. Brandes, U., Eiglsperger, M., Herman, I., Himsolt, M., Marshall, M.S.: GraphML progress report structural layer proposal. In: Mutzel, P., Jünger, M., Leipert, S. (eds.) GD 2001. LNCS, vol. 2265, pp. 501–512. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45848-4_59

    Chapter  Google Scholar 

  33. Dike, J.: User Mode Linux. Prentice Hall, Englewood Cliffs (2006)

    Google Scholar 

  34. Dike, J.: A user-mode port of the linux kernel. In: Proceedings of the 4th Annual Linux Showcase & Conference, ALS 2000, vol. 4, p. 7. USENIX Association, Berkeley (2000)

    Google Scholar 

  35. Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: Evaluation of students’ learning behaviour and success as a prerequisite for modernizing practical on-campus networking courses in higher education. Yükseköğretim Dergisi/J. High. Educ. 4(2), 83–90 (2014a)

    Google Scholar 

  36. Bishop, M., Heberlein, L.: An isolated network for research. In: Proceedings of the Nineteenth National Information Systems Security Conference, pp. 349–360 (1996)

    Google Scholar 

  37. Agarwal, K.K., Critcher, A., Foley, D., Sanati, R., Sigle, J.: Setting up a classroom lab. J. Comput. Sci. Coll. 16(3), 281–286 (2001)

    Google Scholar 

  38. Taylor, K.D., Honchell, J.W., DeWitt, W.E.: Distance learning in courses with a laboratory. In: Proceedings of the 26th Annual Frontiers in Education, FIE 1996, vol. 01, pp. 44–46. IEEE Computer Society, Washington (1996)

    Google Scholar 

  39. Lo, D.C.-T., Qian, K., Chen, W., Shahriar, H., Clincy, V.: Authentic learning in network and security with portable labs. In: 2014 IEEE Frontiers in Education Conference (FIE), vol. 00, pp. 1–5 (2014)

    Google Scholar 

  40. Bardas, A.G., Ou, X.: Setting up and using a cyber security lab for education purposes. J. Comput. Sci. Coll. 28(5), 191–197 (2013)

    Google Scholar 

  41. Jakab, F., Janitor, J., Nagy, M.: Virtual lab in a distributed international environment - SVC EDINET. In: Fifth International Conference on Networking and Services, ICNS 2009, pp. 576–580 (2009)

    Google Scholar 

  42. Yang, T.A., et al.: Design of a distributed computer security lab. J. Comput. Sci. Coll. 20(1), 332–346 (2004)

    Google Scholar 

  43. Yoo, S., Hovis, S.: Remote access internetworking laboratory. In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, pp. 311–314. ACM, New York (2004)

    Google Scholar 

  44. Drigas, A.S., Vrettaros, J., Koukianakis, L.G., Glentzes, J.G.: A virtual lab and e-learning system for renewable energy sources. In: Proceedings of the 1st WSEAS/IASME Conference on Educational Technologies, EDUTE 2005, pp. 149–153 (2005)

    Google Scholar 

  45. Border, C.: The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes. In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, pp. 576–580. ACM, New York (2007)

    Google Scholar 

  46. Hu, J., Cordel, D., Meinel, C.: Virtual machine management for tele-lab “IT-security” server. In: Proceedings of the 10th IEEE Symposium on Computers and Communications, ISCC 2005, pp. 448–453. IEEE Computer Society (2005)

    Google Scholar 

  47. Keller, J., Naues, R.: Design of a virtual computer security lab. In: Proceedings of the IASTED International Conference on Communication, Network, and Information Security, CNIS 2006, pp. 211–215. Acta Press (2006)

    Google Scholar 

  48. Krishna, K., Sun, W., Rana, P., Li, T., Sekar, R.: V-NetLab: a cost-effective platform to support course projects in computer security. In: Proceedings of 9th Colloquium for Information Systems Security Education. The Printing House Inc. (2005)

    Google Scholar 

  49. Lahoud PhD (ABD), H.A., Tang PhD, X.: Information security labs in IDS/IPS for distance education. In: Proceedings of the 7th Conference on Information Technology Education, SIGITE 2006, pp. 47–52. ACM, New York (2006)

    Google Scholar 

  50. Brian Hay, K.L.N.: Evolution of the ASSERT computer security lab. In: Proceedings of the 10th Colloquium for Information Systems Security Education (2006)

    Google Scholar 

  51. Bullers Jr., W.I., Burd, S., Seazzu, A.F.: Virtual machines - an idea whose time has returned: application to network, security, and database courses. In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2006, pp. 102–106. ACM, New York (2006)

    Google Scholar 

  52. Damiani, E.: The open source virtual lab: a case study. In: Proceedings of the Workshop on Free and Open Source Learning Environments and Tools, FOSLET 2006 (2006)

    Google Scholar 

  53. O’Leary, M.: A laboratory based capstone course in computer security for undergraduates. In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2006, pp. 2–6. ACM, New York (2006)

    Google Scholar 

  54. Li, P.: Exploring virtual environments in a decentralized lab. SIGITERes. IT 6(1), 4–10 (2009a)

    Google Scholar 

  55. Ellabidy, M., Russo, J.P.: Using the cloud to replace traditional physical networking laboratories. In: Proceedings of the 45th ACM Technical Symposium on Computer Science Education, SIGCSE 2014, p. 729. ACM, New York (2014)

    Google Scholar 

  56. Mhd Wael Bazzaza, K.S.: Using the cloud to teach computer networks. In: Proceedings of the 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), UCC 2015, pp. 310–314 (2015)

    Google Scholar 

  57. Salah, K.: Harnessing the cloud for teaching cybersecurity. In: Proceedings of the 45th ACM Technical Symposium on Computer Science Education, SIGCSE 2014, pp. 529–534. ACM, New York (2014)

    Google Scholar 

  58. Peterson, L., Anderson, T., Culler, D., Roscoe, T.: A blueprint for introducing disruptive technology into the internet. SIGCOMM Comput. Commun. Rev. 33(1), 59–64 (2003)

    Article  Google Scholar 

  59. Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R., Seskar, I.: GENI: a federated testbed for innovative network experiments. Comput. Netw. 61, 5–23 (2014)

    Article  Google Scholar 

  60. Li, P.: Exploring virtual environments in a decentralized lab. SIGITERes. IT 6(1), 4–10 (2009b)

    Google Scholar 

  61. Li, P.: Centralized and decentralized lab approaches based on different virtualization models. J. Comput. Sci. Coll. 26(2), 263–269 (2010)

    Google Scholar 

  62. Seeling, P.: Labs@home. SIGCSE Bull. 40(4), 75–77 (2008)

    Article  Google Scholar 

  63. Heeren, B., Jeuring, J., van Leeuwen, A., Gerdes, A.: Specifying strategies for exercises. In: Autexier, S., Campbell, J., Rubio, J., Sorge, V., Suzuki, M., Wiedijk, F. (eds.) CICM 2008. LNCS (LNAI), vol. 5144, pp. 430–445. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85110-3_36

    Chapter  Google Scholar 

  64. Gerdes, A., Heeren, B., Jeuring, J.: Properties of exercise strategies. In: Proceedings International Workshop on Strategies in Rewriting, Proving, and Programming, IWS 2010, Edinburgh, UK, 9th July 2010, pp. 21–34 (2010)

    Google Scholar 

  65. Haag, J.: DVCL: A Distributed Virtual Computer Lab for security and network education. Ph.D. thesis, Open Universiteit (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Harald Vranken .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer-Verlag GmbH Germany, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Haag, J., Vranken, H., van Eekelen, M. (2019). A Virtual Classroom for Cybersecurity Education. In: Pan, Z., Cheok, A., Müller, W., Zhang, M., El Rhalibi, A., Kifayat, K. (eds) Transactions on Edutainment XV. Lecture Notes in Computer Science(), vol 11345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-59351-6_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-59351-6_13

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-59350-9

  • Online ISBN: 978-3-662-59351-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics