skip to main content
10.1145/2656450.2656462acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach

Published:14 October 2014Publication History

ABSTRACT

Sniffing attack is a common network attack and a fundamental topic to information security education. The sniffing attack is usually used by malicious users to spy network traffic, and to collect confidential and sensitive information. With the objective of enhancing information security education, this paper discusses what fundamental security concepts and hands-on skills the students need to know and acquire about network sniffing attack, respectively. The learning objective of the discussed hands-on lab exercises is to teach students how to practically sniff network traffic in an isolated network laboratory environment and detect hosts preforming sniffing activities. The paper does so in the hope that it will encourage the teaching of sniffing attack topic when offering courses on network security, using a hands-on approach. The paper discusses also the implications of the offered hands-on lab exercises on the students' performance and learning outcomes.

References

  1. Ace Password Sniffer tool. http://www.effetech.com/aps.Google ScholarGoogle Scholar
  2. Brutus, S., Shubina, A., and Locasto. M. 2010. Teaching principles of the hacker curriculum to undergraduates. In the Procceedings of the 41st ACM Technical Symposium on Computer Science Education. 2010, Milwaukee, WI, USA, 122--126. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Chen, L., and Lin, C. 2007. Combining theory with practice in information security education. In Proceedings of the 11th Colloquium for Information Systems Security Education. 2007, Boston, MA, USA, 28--35.Google ScholarGoogle Scholar
  4. CommView Packet Analyzer tool. http://www.tamos.com.Google ScholarGoogle Scholar
  5. CNSS. 2004. National Information Assurance Standard for System Administrators (SAs). Committee on National Security Systems. March 2004.Google ScholarGoogle Scholar
  6. Cook, T., Conti, G., and Raymond, D. 2012. When good Ninjas turn bad: Preventing your students from becoming the threat. In the Procceedings of the 16th Colloquim for Informaion System Security Education. 2012, Lake Buena Vista, Florida, USA, 61--67.Google ScholarGoogle Scholar
  7. Ledin, G. 2011. The growing harm of not teaching malware. Communications of the ACM, 54(2), 2011, 32--34. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Logan, P., and Clarkson, A. 2005. Teaching students to hack: Curriculum issues in information security. In the Procceedings of the 36th SIGCSE Technical Symposium on Computer Science. ACM SIGCSE. 2005. St. Louis, MO, USA, 157--161. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. NetScanTools Pro tool. http://www.netscantools.com.Google ScholarGoogle Scholar
  10. Nmap tool. http://www.nmap.org.Google ScholarGoogle Scholar
  11. NSTISS. 1994. National Training Standard for Information Systems Security (InfoSec) Professionals. NSTISS. June 20 1994.Google ScholarGoogle Scholar
  12. PMD tool. http://webteca.altervista.org/index.htm.Google ScholarGoogle Scholar
  13. PromiScan tool. http://www.securityfriday.com.Google ScholarGoogle Scholar
  14. Trabelsi, Z., and Alketbi, L. 2013. Using network packet generators and Snort rules for teaching Denail of Service Attacks?, In Procceedings of the 18th ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE'13. 2013, Canterbury, UK, 285--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Trabelsi, Z. 2011. Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning. In Proceedings of the Information Security Curriculum Development Conference. 2011, Kennesaw, GA, USA, 74--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Trabelsi, Z., and Shuaib, K. 2008. A novel Man-in-the-Middle intrusion detection scheme for switched LANs. International Journal of Computers and Application (202), 2008.3.202--2195.Google ScholarGoogle Scholar
  17. Trabelsi, Z., Hayawi, K., Al Braiki, A., and Mathew, S. S. 2013. Network attacks and defenses: A hands-on approach. CRC Press, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Trabelsi, Z., and Ibrahim, W. 2013. A Hands-on Approach for Teaching Denial of Service Attacks: A Case Study, Journal of Information Technology Education: Innovations in Practice (JITE:IIP), Volume 12, 2013, 299--319.Google ScholarGoogle Scholar
  19. Yuan, D., and Zhong, J. 2008. A lab implementation of TCP SYN flood attack and defense. In the Procceedings of the 9th ACM SIGITE Conference on Information Technology Education. 2008, Cincinnati, OH, USA, 57--58. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Enhancing the comprehension of network sniffing attack in information security education using a hands-on lab approach

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGITE '14: Proceedings of the 15th Annual Conference on Information technology education
        October 2014
        190 pages
        ISBN:9781450326865
        DOI:10.1145/2656450

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 October 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SIGITE '14 Paper Acceptance Rate28of60submissions,47%Overall Acceptance Rate176of429submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader