CLaaS: Cybersecurity Lab as a Service - Design, Analysis, and Evaluation

被引:4
|
作者
Tunc, Cihan [1 ]
Hariri, Salim [1 ]
Montero, Fabian De La Pena [1 ]
Fargo, Farah [1 ]
Satam, Pratik [1 ]
机构
[1] Univ Arizona, NSF Ctr Cloud & Auton Comp, Tucson, AZ 85721 USA
关键词
CLaaS; virtualization; cybersecurity; virtual lab; education;
D O I
10.1109/ICCAC.2015.34
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The explosive growth of IT infrastructures, cloud systems, and Internet of Things (IoT) have resulted in complex systems that are extremely difficult to secure and protect against cyberattacks that are growing exponentially in the complexity and also in the number. Overcoming the cybersecurity challenges require cybersecurity environments supporting the development of innovative cybersecurity algorithms and evaluation of the experiments. In this paper, we present the design, analysis, and evaluation of the Cybersecurity Lab as a Service (CLaaS) which offers virtual cybersecurity experiments as a cloud service that can be accessed from anywhere and from any device (desktop, laptop, tablet, smart mobile device, etc.) with Internet connectivity. We exploit cloud computing systems and virtualization technologies to provide isolated and virtual cybersecurity experiments for vulnerability exploitation, launching cyberattacks, studying how cyber resources and services can be hardened, etc. We also present our performance evaluation and effectiveness of CLaaS experiments used by students.
引用
收藏
页码:224 / 227
页数:4
相关论文
共 50 条
  • [1] Design and Evaluation of a Cybersecurity Awareness Training Game
    Duy Huynh
    Phuc Luong
    Iida, Hiroyuki
    Beuran, Razvan
    [J]. ENTERTAINMENT COMPUTING - ICEC 2017, 2018, 10507 : 183 - 188
  • [2] Individualizing Cybersecurity Lab Exercises with Labtainers
    Thompson, Michael F.
    Irvine, Cynthia E.
    [J]. IEEE SECURITY & PRIVACY, 2018, 16 (02) : 91 - 95
  • [3] BUILDING A CYBERSECURITY LAB WITH LEGACY EQUIPMENT
    Ellabidy, Magdy
    Yu, Chen-Hsiang
    Yun, Mira
    [J]. ICERI2016: 9TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION, 2016, : 4407 - 4411
  • [4] Design and evaluation of a self-paced cybersecurity tool
    Shojaifar, Alireza
    Fricker, Samuel A.
    [J]. INFORMATION AND COMPUTER SECURITY, 2023, 31 (02) : 244 - 262
  • [5] Analysis of the Design Space for Cybersecurity Visualizations in VizSec
    Komadina, Adrian
    Mihajlovic, Zeljka
    Gros, Stjepan
    [J]. 2022 IEEE SYMPOSIUM ON VISUALIZATION FOR CYBER SECURITY (VIZSEC), 2022,
  • [6] Merging safety and cybersecurity analysis in product design
    Suo, Dajiang
    Siegel, Joshua E.
    Sarma, Sanjay E.
    [J]. IET INTELLIGENT TRANSPORT SYSTEMS, 2018, 12 (09) : 1103 - 1109
  • [7] Building resilience in cybersecurity: An artificial lab approach
    Awiszus, Kerstin
    Bell, Yannick
    Luettringhaus, Jan
    Svindland, Gregor
    Voss, Alexander
    Weber, Stefan
    [J]. JOURNAL OF RISK AND INSURANCE, 2024, 91 (03) : 753 - 800
  • [8] Cybersecurity compliance analysis as a service: Requirements specification and application scenarios
    Furfaro, Angelo
    Gallo, Teresa
    Garro, Alfredo
    Sacca, Domenico
    Tundis, Andrea
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2018, 30 (12):
  • [9] Design and Evaluation of an Augmented Reality Game for Cybersecurity Awareness (CybAR)
    Alqahtani, Hamed
    Kavakli-Thorne, Manolya
    [J]. INFORMATION, 2020, 11 (02)
  • [10] Cybersecurity Competitive Labs-as-a-Service: Automated Score and Message Board Design
    Hempenius, Nicholas
    Chou, Te-Shun
    Toderick, Lee
    [J]. SIGITE'18: PROCEEDINGS OF THE 19TH ANNUAL SIG CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION, 2018, : 148 - 148