Abstract
Education in general and cybersecurity education in particular can be made more attractive by adding hands-on experience to classrooms. This requires new technology, such as virtualisation, to be developed fully geared towards the needs of educational purposes. Over the years, several techniques have been developed by the authors. In this paper, the authors first give a full account of their earlier work on a distributed virtual computer lab for cybersecurity education. Then, this virtual lab is extended with educational enhancements, such as an intelligent tutoring system, which resulted in a prototype for a virtual classroom for cybersecurity education.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Netkit, http://wiki.netkit.org, Online, accessed April 2018.
- 2.
The User-mode Linux Kernel Home Page, http://user-mode-linux.sourceforge.net, Online, accessed April 2018.
- 3.
KNOPPIX, http://www.knopper.net/knoppix, Online, accessed April 2018.
- 4.
VMware Player, http://www.vmware.com, Online, accessed April 2018.
- 5.
VirtualBox, http://www.virtualbox.org, Online, accessed April 2018.
- 6.
SWI Prolog, http://www.swi-prolog.org, Online, accessed April 2018.
- 7.
OpenSSL - Cryptography and SSL/TLS Toolkit, https://www.openssl.org, Online, accessed April 2018.
- 8.
GTK+, https://www.gtk.org/, Online, accessed April 2018.
References
Hu, J., Meinel, C., Schmitt, M.: Tele-lab IT security: An architecture for interactive lessons for security education. In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, pp. 412–416. ACM, New York (2004)
Albacete, P.L., VanLehn, K.: The conceptual helper: an intelligent tutoring system for teaching fundamental physics concepts. In: Gauthier, G., Frasson, C., VanLehn, K. (eds.) ITS 2000. LNCS, vol. 1839, pp. 564–573. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-45108-0_60
Mahdi, A.O., Alhabbash, M.I., Naser, S.S.A.: An Intelligent Tutoring System for Teaching Advanced Topics in Information Security (2016)
Vanlehn, K., et al.: The andes physics tutoring system: lessons learned. Int. J. Artif. Intell. Educ. 15(3), 147–204 (2005)
Hu, J., Schmitt, M., Willems, C., Meinel, C.: A tutoring system for IT security. In: Irvine, C., Armstrong, H. (eds.) Security Education and Critical Infrastructures. ITIFIP, vol. 125, pp. 51–60. Springer, Boston, MA (2003). https://doi.org/10.1007/978-0-387-35694-5_5
Corbett, A.T., Koedinger, K.R., Anderson, J.R.: Intelligent tutoring systems. Handb. Hum. Comput. Interact. 5, 849–874 (1997)
Psotka, J., Massey, L.D., Mutter, S.A.: Intelligent Tutoring Systems: Lessons Learned. Psychology Press, Hillsdale (1988)
Melis, E., Siekmann, J.: ActiveMath: an intelligent tutoring system for mathematics. In: Rutkowski, L., Siekmann, J.H., Tadeusiewicz, R., Zadeh, L.A. (eds.) ICAISC 2004. LNCS (LNAI), vol. 3070, pp. 91–101. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24844-6_12
Canfield, W.: ALEKS: a web-based intelligent tutoring system. Math. Comput. Educ. 35(2), 152 (2001)
Yang, F.-J.: A virtual tutor for relational schema normalization. ACM Inroads 2(3), 38–42 (2011)
Kenny, C., Pahl, C.: Automated tutoring for a database skills training environment, vol. 37. ACM (2005)
Suraweera, P., Mitrovic, A.: An intelligent tutoring system for entity relationship modelling. Int. J. Artif. Intell. Educ. 14(3, 4), 375–417 (2004)
Queirós, R.A.P., Leal, J.P.: PETCHA: a programming exercises teaching assistant. In: Proceedings of the 17th ACM Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE 2012, pp. 192–197. ACM, New York (2012)
Sykes, E.R., Franek, F.: A prototype for an intelligent tutoring system for students learning to program in Java (TM). In: Proceedings of the IASTED International Conference on Computers and Advanced Technology in Education, pp. 78–83 (2003)
Vesin, B., Ivanović, M., Klašnja-Milićević, A., Budimac, Z.: Ontology-based architecture with recommendation strategy in java tutoring system. Comput. Sci. Inf. Syst. 10(1), 237–261 (2013)
Jeuring, J., van Binsbergen, L.T., Gerdes, A., Heeren, B.: Model solutions and properties for diagnosing student programs in ask-elle. In: Proceedings of the Computer Science Education Research Conference, CSERC 2014, pp. 31–40. ACM, New York (2014)
Pizzonia, M., Rimondini, M.: Netkit: easy emulation of complex networks on inexpensive hardware. In: Proceedings of the 4th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities, TridentCom 2008, pp. 7:1–7:10, ICST, Brussels, Belgium. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) (2008)
Vranken, H., Koppelman, H.: A virtual computer security lab for distance education. In: Proceedings of the 5th IASTED European Conference on Internet and Multimedia Systems and Applications, EuroIMSA 2009, pp. 21–27. Acta Press (2009)
Colmerauer, A., Roussel, P.: The birth of prolog. In: The Second ACM SIGPLAN Conference on History of Programming Languages, HOPL-II, pp. 37–52. ACM, New York (1993)
Rescorla, E., Modadugu, N.: Datagram transport layer security (2006). http://www.ietf.org/rfc/rfc4347.txt. Accessed 22 July 2014
Rescorla, E., Modadugu, N.: Datagram transport layer security version 1.2 (2012). http://www.ietf.org/rfc/rfc6347.txt. Accessed 22 July 2014
Dierks, T., Allen, C.: The TLS protocol version 1.0 (1999). http://www.ietf.org/rfc/rfc2246.txt. Accessed 22 July 2014
Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.1 (2006). http://www.ietf.org/rfc/rfc4346.txt. Accessed 22 July 2014
Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.2 (2008). http://www.ietf.org/rfc/rfc5246.txt. Accessed 22 July 2014
Wielemaker, J.: Logic programming for knowledge-intensive interactive applications. PhD thesis, University of Amsterdam (2009)
Vranken, H., Haag, J., Horsmann, T., Karsch, S.: A distributed virtual computer security lab. In: Proceedings of the 3rd International Conference on Computer Supported Education, CSEDU 2011, pp. 110–119. SciTePress (2011)
Haag, J., Horsmann, T., Karsch, S., Vranken, H.: A distributed virtual computer security lab with central authority. In: Proceedings of the Computer Science Education Research Conference, CSERC 2011, pp. 89–95. Open Universiteit, Heerlen (2011)
Haag, J., Karsch, S., Vranken, H., Van Eekelen, M.: A virtual computer security lab as learning environment for networking and security courses. In: Proceedings of the 3rd Annual International Conference on Computer Science Education: Innovation and Technology, CSEIT 2012, pp. 61–68. Global Science & Technology Forum (2012)
Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: Evaluation of students’ learning behaviour and success in a practical computer networking course. In: Proceedings of the 2nd International Conference on E-Learning and E-Technologies in Education, ICEEE 2013, pages 201–206. IEEE (2013)
Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, New York (2003)
Tanenbaum, A.S.: Computer Networks. Prentice Hall PTR, Upper Saddle River (1985)
Brandes, U., Eiglsperger, M., Herman, I., Himsolt, M., Marshall, M.S.: GraphML progress report structural layer proposal. In: Mutzel, P., Jünger, M., Leipert, S. (eds.) GD 2001. LNCS, vol. 2265, pp. 501–512. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45848-4_59
Dike, J.: User Mode Linux. Prentice Hall, Englewood Cliffs (2006)
Dike, J.: A user-mode port of the linux kernel. In: Proceedings of the 4th Annual Linux Showcase & Conference, ALS 2000, vol. 4, p. 7. USENIX Association, Berkeley (2000)
Haag, J., Witte, C., Karsch, S., Vranken, H., Van Eekelen, M.: Evaluation of students’ learning behaviour and success as a prerequisite for modernizing practical on-campus networking courses in higher education. Yükseköğretim Dergisi/J. High. Educ. 4(2), 83–90 (2014a)
Bishop, M., Heberlein, L.: An isolated network for research. In: Proceedings of the Nineteenth National Information Systems Security Conference, pp. 349–360 (1996)
Agarwal, K.K., Critcher, A., Foley, D., Sanati, R., Sigle, J.: Setting up a classroom lab. J. Comput. Sci. Coll. 16(3), 281–286 (2001)
Taylor, K.D., Honchell, J.W., DeWitt, W.E.: Distance learning in courses with a laboratory. In: Proceedings of the 26th Annual Frontiers in Education, FIE 1996, vol. 01, pp. 44–46. IEEE Computer Society, Washington (1996)
Lo, D.C.-T., Qian, K., Chen, W., Shahriar, H., Clincy, V.: Authentic learning in network and security with portable labs. In: 2014 IEEE Frontiers in Education Conference (FIE), vol. 00, pp. 1–5 (2014)
Bardas, A.G., Ou, X.: Setting up and using a cyber security lab for education purposes. J. Comput. Sci. Coll. 28(5), 191–197 (2013)
Jakab, F., Janitor, J., Nagy, M.: Virtual lab in a distributed international environment - SVC EDINET. In: Fifth International Conference on Networking and Services, ICNS 2009, pp. 576–580 (2009)
Yang, T.A., et al.: Design of a distributed computer security lab. J. Comput. Sci. Coll. 20(1), 332–346 (2004)
Yoo, S., Hovis, S.: Remote access internetworking laboratory. In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, pp. 311–314. ACM, New York (2004)
Drigas, A.S., Vrettaros, J., Koukianakis, L.G., Glentzes, J.G.: A virtual lab and e-learning system for renewable energy sources. In: Proceedings of the 1st WSEAS/IASME Conference on Educational Technologies, EDUTE 2005, pp. 149–153 (2005)
Border, C.: The development and deployment of a multi-user, remote access virtualization system for networking, security, and system administration classes. In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, pp. 576–580. ACM, New York (2007)
Hu, J., Cordel, D., Meinel, C.: Virtual machine management for tele-lab “IT-security” server. In: Proceedings of the 10th IEEE Symposium on Computers and Communications, ISCC 2005, pp. 448–453. IEEE Computer Society (2005)
Keller, J., Naues, R.: Design of a virtual computer security lab. In: Proceedings of the IASTED International Conference on Communication, Network, and Information Security, CNIS 2006, pp. 211–215. Acta Press (2006)
Krishna, K., Sun, W., Rana, P., Li, T., Sekar, R.: V-NetLab: a cost-effective platform to support course projects in computer security. In: Proceedings of 9th Colloquium for Information Systems Security Education. The Printing House Inc. (2005)
Lahoud PhD (ABD), H.A., Tang PhD, X.: Information security labs in IDS/IPS for distance education. In: Proceedings of the 7th Conference on Information Technology Education, SIGITE 2006, pp. 47–52. ACM, New York (2006)
Brian Hay, K.L.N.: Evolution of the ASSERT computer security lab. In: Proceedings of the 10th Colloquium for Information Systems Security Education (2006)
Bullers Jr., W.I., Burd, S., Seazzu, A.F.: Virtual machines - an idea whose time has returned: application to network, security, and database courses. In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2006, pp. 102–106. ACM, New York (2006)
Damiani, E.: The open source virtual lab: a case study. In: Proceedings of the Workshop on Free and Open Source Learning Environments and Tools, FOSLET 2006 (2006)
O’Leary, M.: A laboratory based capstone course in computer security for undergraduates. In: Proceedings of the 37th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2006, pp. 2–6. ACM, New York (2006)
Li, P.: Exploring virtual environments in a decentralized lab. SIGITERes. IT 6(1), 4–10 (2009a)
Ellabidy, M., Russo, J.P.: Using the cloud to replace traditional physical networking laboratories. In: Proceedings of the 45th ACM Technical Symposium on Computer Science Education, SIGCSE 2014, p. 729. ACM, New York (2014)
Mhd Wael Bazzaza, K.S.: Using the cloud to teach computer networks. In: Proceedings of the 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC), UCC 2015, pp. 310–314 (2015)
Salah, K.: Harnessing the cloud for teaching cybersecurity. In: Proceedings of the 45th ACM Technical Symposium on Computer Science Education, SIGCSE 2014, pp. 529–534. ACM, New York (2014)
Peterson, L., Anderson, T., Culler, D., Roscoe, T.: A blueprint for introducing disruptive technology into the internet. SIGCOMM Comput. Commun. Rev. 33(1), 59–64 (2003)
Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R., Seskar, I.: GENI: a federated testbed for innovative network experiments. Comput. Netw. 61, 5–23 (2014)
Li, P.: Exploring virtual environments in a decentralized lab. SIGITERes. IT 6(1), 4–10 (2009b)
Li, P.: Centralized and decentralized lab approaches based on different virtualization models. J. Comput. Sci. Coll. 26(2), 263–269 (2010)
Seeling, P.: Labs@home. SIGCSE Bull. 40(4), 75–77 (2008)
Heeren, B., Jeuring, J., van Leeuwen, A., Gerdes, A.: Specifying strategies for exercises. In: Autexier, S., Campbell, J., Rubio, J., Sorge, V., Suzuki, M., Wiedijk, F. (eds.) CICM 2008. LNCS (LNAI), vol. 5144, pp. 430–445. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85110-3_36
Gerdes, A., Heeren, B., Jeuring, J.: Properties of exercise strategies. In: Proceedings International Workshop on Strategies in Rewriting, Proving, and Programming, IWS 2010, Edinburgh, UK, 9th July 2010, pp. 21–34 (2010)
Haag, J.: DVCL: A Distributed Virtual Computer Lab for security and network education. Ph.D. thesis, Open Universiteit (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer-Verlag GmbH Germany, part of Springer Nature
About this chapter
Cite this chapter
Haag, J., Vranken, H., van Eekelen, M. (2019). A Virtual Classroom for Cybersecurity Education. In: Pan, Z., Cheok, A., Müller, W., Zhang, M., El Rhalibi, A., Kifayat, K. (eds) Transactions on Edutainment XV. Lecture Notes in Computer Science(), vol 11345. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-59351-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-662-59351-6_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-59350-9
Online ISBN: 978-3-662-59351-6
eBook Packages: Computer ScienceComputer Science (R0)