TY - GEN
T1 - CLaaS
T2 - International Conference on Cloud and Autonomic Computing, ICCAC 2015
AU - Tunc, Cihan
AU - Hariri, Salim
AU - Montero, Fabian De La Pena
AU - Fargo, Farah
AU - Satam, Pratik
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/10/28
Y1 - 2015/10/28
N2 - The explosive growth of IT infrastructures, cloud systems, and Internet of Things (IoT) have resulted in complex systems that are extremely difficult to secure and protect against cyberattacks that are growing exponentially in the complexity and also in the number. Overcoming the cybersecurity challenges require cybersecurity environments supporting the development of innovative cybersecurity algorithms and evaluation of the experiments. In this paper, we present the design, analysis, and evaluation of the Cybersecurity Lab as a Service (CLaaS) which offers virtual cybersecurity experiments as a cloud service that can be accessed from anywhere and from any device (desktop, laptop, tablet, smart mobile device, etc.) with Internet connectivity. We exploit cloud computing systems and virtualization technologies to provide isolated and virtual cybersecurity experiments for vulnerability exploitation, launching cyberattacks, how cyber resources and services can be hardened, etc. We also present our performance evaluation and effectiveness of CLaaS experiments used by students.
AB - The explosive growth of IT infrastructures, cloud systems, and Internet of Things (IoT) have resulted in complex systems that are extremely difficult to secure and protect against cyberattacks that are growing exponentially in the complexity and also in the number. Overcoming the cybersecurity challenges require cybersecurity environments supporting the development of innovative cybersecurity algorithms and evaluation of the experiments. In this paper, we present the design, analysis, and evaluation of the Cybersecurity Lab as a Service (CLaaS) which offers virtual cybersecurity experiments as a cloud service that can be accessed from anywhere and from any device (desktop, laptop, tablet, smart mobile device, etc.) with Internet connectivity. We exploit cloud computing systems and virtualization technologies to provide isolated and virtual cybersecurity experiments for vulnerability exploitation, launching cyberattacks, how cyber resources and services can be hardened, etc. We also present our performance evaluation and effectiveness of CLaaS experiments used by students.
KW - CLaaS
KW - cybersecurity
KW - education
KW - virtual lab
KW - virtualization
UR - http://www.scopus.com/inward/record.url?scp=84962053976&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84962053976&partnerID=8YFLogxK
U2 - 10.1109/ICCAC.2015.34
DO - 10.1109/ICCAC.2015.34
M3 - Conference contribution
AN - SCOPUS:84962053976
T3 - Proceedings - 2015 International Conference on Cloud and Autonomic Computing, ICCAC 2015
SP - 224
EP - 227
BT - Proceedings - 2015 International Conference on Cloud and Autonomic Computing, ICCAC 2015
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 21 September 2015 through 25 September 2015
ER -