On the Necessity of Establishing a National Cybersecurity Testbed
DOI:
https://doi.org/10.21928/juhd.v2n4y2016.pp428-436Keywords:
community cloud, cybersecurity, information security, software defined networks, virtualizationAbstract
Information security now is considered to be cross-disciplinary and comprehensive field. It integrates the accumulation of knowledge in many disciplines like computer science, mathematics, communications, electronics, physics, etc. Thus, there has been an ongoing effort to improve the experiences in information security experimentation. Many international institutions are investigating enhanced approaches to provide hands-on learning and research environments. However, academic institutions are facing with the difficult challenge of providing lab infrastructuresthat meet the increasingly growing needs of cybersecurity training. In this paper, we report on the necessity and importance of building an effective national testbed for cybersecurity experimentation. We also present a general top-level architecture for this testbed emphasizing the most important enabling technologies.
References
[2] Izzat M. Alsmadi, Mohammed N. Al-Kabi, and Emad Abu-Shanab, “Requirements and Challenges for Building a National Open Security Lab,” First Summit on Countering Cyber Crimes, Riyadh, KSA, 27-29/10/2015, pp. 1-15.
[3] Li Zhu, Huaqing Mao and Zhiwen Hu, “A New Construction Scheme for Information Security Lab,” Scientific Research- Creative Education, Vol.3, No.4, August 2012, pp. 406-412.
[4] L. Xu, D. Huang, and Wei-Tek Tsai, “Cloud-Based Virtual Laboratory for Network Security Education,” IEEE Transactions on Education, Vol. 57, No. 3, August 2014, pp. 145-150.
[5] K. Nance, B. Hay, R. Dodge, A. Seazzu, and S. Bird, “Virtual Laboratory Environments: Methodologies for Educating Cybersecurity Researchers,” Methodological Innovations Online, Vol. 4, No.3, 2009, pp. 3-14.
[6] Q. Niyaz, W. Sun, R. Xu, and M. Alam, “ LightVN: A Light-Weight Testbed for Network and Security Experiments,” 12th International Conference on Information Technology - New Generations, IEEE, 2015, pp.459-464.
[7] Timothy Rosenberg and Lance J. Hoffman, “Taking the Network on the Road: Portable Network Solutions for Computer Security Educators,” ACM Journal on Educational Resources in Computing, Vol. 6, No. 4, December 2006, Article 2, pp. 1-13.
[8] Wenliang Du and Ronghua Wang, “SEED: A Suite of Instructional Laboratories for Computer Security Education,” ACM Journal on Educational Resources in Computing, Vol. 8, No. 1, Article 3, March 2008, pp. 1-24.
[9] T. Andrew Yang, Kwok-Bun Yue, Morris Liaw, George Collins, Jayaraman T. Venkatraman, Swati Achar, Karthik Sadasivam, and Ping Chen, “Design of a Distributed Computer Security Lab,” Journal of Computing Sciences in Colleges, Vol. 20, Issue 1, October 2004, pp. 332-346.
[10] Jeffrey L. Duffany, “Design of a Network Security Teaching and Research Lab,” Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI’2008), Honduras, 4-6 June 2008, pp. WE1-1 – WE1-7.
[11] Alexandru G. Bardas and Xinming Ou, “Setting Up and Using a Cyber Security Lab for Education Purposes”, Consortium for Computing Sciences in Colleges, JCSC, Vol. 28, No. 5, May 2013, pp. 191-197.
[12] Sumit Goyal,"Public vs Private vs Hybrid vs Community - Cloud Computing: A Critical Review", International Journal of Computer Network and Information Security (IJCNIS), Vol.6, No.3, 2014, pp.20-29.
[13] Matthias Henneberger and Achim Luhn, “Community Clouds – supporting business ecosystems with cloud computing,” Siemens IT Solutions and Services, White Paper, Siemens, 2010.
[14] S. Salsano, P. Ventre, F. Lombardo, G. Siracusano, M. Gerola, E. Salvadori, M. Santuari, M. Campanella, and L. Prete, “Hybrid IP/SDN Networking: Open Implementation and Experiment Management Tools,” IEEE Transactions on Network and Service Management, Vol. 13, No. 1, March 2016, pp.138-153.
[15] K. Choumas, N. Makris, T. Korakis, L. Tassiulas, and M. Ott, “Testbed Innovations for Experimenting with Wired and Wireless Software Defined Networks,” 35th International Conference on Distributed Computing Systems Workshops, IEEE, 2015, pp. 87-94.
[16] Terry Benzel, Bob Braden, Ted Faber, Jelena Mirkovic, Steve Schwab, Karen Sollins, and John Wroclawski, “Current Developments in DETER Cybersecurity Testbed Technology,” Conference For Homeland Security (CATCH '09): Cybersecurity Applications & Technology, IEEE, 3-4 March 2009, pp. 1-14.
[17] David Balenson, Laura Tinnel, and Terry Benzel, “Cybersecurity Experimentation of the Future (CEF): Catalyzing a New Generation of Experimental Cybersecurity Research- Community Plan and Roadmap to Develop Future Experimentation Infrastructure in Support of Cybersecurity Research,” Final Report, SRI International and USC Information Sciences Institute, July 31, 2015.
[18] Jelena Mirkovic, Terry V. Benzel, Ted Faber, Robert Braden, John T. Wroclawski, and Stephen Schwab, “The DETER Project: Advancing the Science of Cyber Security Experimentation and Test,” IEEE International Conference on Technologies for Homeland Security (HST), 8-10 Nov., IEEE, pp. 1-7
[19] Jelena Mirkovic and Terry Benzel, “Teaching Cybersecurity with DeterLab,” IEEE Security & Privacy, January/February 2012, pp. 73-76.