A Simulated Infiltration Test for Network in Virtual Environment Using VMware Virtualization Technique

被引:0
|
作者
Kim, Guk-Il [1 ]
Kim, Jonghyeon [2 ]
机构
[1] Ajou Univ, Grad Sch Informat & Commun Technol, Suwon, South Korea
[2] Ajou Univ, Informat & Commun Technol, Suwon, South Korea
关键词
Cyber attack; VMware; Information security; Network security; SYSTEM;
D O I
10.1007/978-981-10-7605-3_34
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to rapid development of IT technology, almost all things are being databased and as the value of information assets, the number of cyber attacks is increasing. Accordingly, the role of the white-hackers is becoming important, as well as their training. For the training, a simulated network infiltration test environment has been constructed in this study by using VMware's virtualization technique to allow potential white-hackers to study the basics in networking area and some of the major attacking techniques which were actually put into the tests.
引用
收藏
页码:204 / 209
页数:6
相关论文
共 50 条
  • [1] Virtual network embedding algorithms in the network virtualization environment
    Qing, Su-De
    Liao, Jian-Xin
    Zhu, Xiao-Min
    Wang, Jing-Yu
    Qi, Qi
    Liao, J.-X. (liaojianxin@ebupt.com), 1600, Chinese Academy of Sciences (23): : 3045 - 3058
  • [2] Performance Evaluation of MikroTik-based Virtual Machine for Small-Scale Network Virtualization on VMware Platform
    Marcel
    2018 INTERNATIONAL CONFERENCE ON CONTROL, ELECTRONICS, RENEWABLE ENERGY AND COMMUNICATIONS (ICCEREC), 2018, : 154 - 158
  • [3] Creating Network Test Setup Using Virtualization and Simulation
    Shriramwar, Abhay
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 317 - 324
  • [4] Dynamic Energy Efficient Virtual Link Resource Reallocation Approach for Network Virtualization Environment
    Zhang, Shanming
    Sato, Takehiro
    Okamoto, Satoru
    Yamanaka, Naoaki
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (07) : 1675 - 1684
  • [5] Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine
    Noorafiza, M.
    Maeda, H.
    Uda, R.
    Kinoshita, T.
    Shiratori, M.
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 83 - 89
  • [6] Upper Extremity Proprioceptive Assessment Test Using Virtual Environment Technique in Patients with Stroke
    Lee, Ki Hoon
    Ku, Jeounghun
    Jo, Sang Woo
    Kim, Sun I.
    Song, Je Young
    Park, Young Jin
    Kim, Hyun Jung
    Kang, Youn Joo
    ANNALS OF REHABILITATION MEDICINE-ARM, 2010, 34 (02): : 141 - 149
  • [7] Forecasting display technique of human in network virtual environment
    Wu, Wei
    Zhang, Jing
    Journal of Harbin Institute of Technology (New Series), 2001, 8 (03) : 207 - 211
  • [8] Forecasting display technique of human in network virtual environment
    吴葳
    张晶
    Journal of Harbin Institute of Technology, 2001, (03) : 207 - 211
  • [9] A Virtual Environment Using Virtual Reality and Artificial Neural Network
    Sait, Abdul Rahaman Wahab
    Raza, Mohammad Nazim
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (12) : 130 - 133
  • [10] Virtual Data Mart for Measuring Organizational Achievement Using Data Virtualization Technique (KPIVDM)
    Mousa, Ayad Hameed
    Shiratuddin, Norshuhada
    Abu Bakar, Muhamad Shahbani
    JURNAL TEKNOLOGI, 2014, 68 (03):