Creating A Customized Cybersecurity Lab Environment Using Hardware Virtualization and Containerization

UIU Institutional Repository

    • Login
    View Item 
    •   UIU DSpace Home
    • School of Science and Engineering (SoSE)
    • Department of Computer Science and Engineering (CSE)
    • M.Sc Thesis/Project
    • View Item
    •   UIU DSpace Home
    • School of Science and Engineering (SoSE)
    • Department of Computer Science and Engineering (CSE)
    • M.Sc Thesis/Project
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Creating A Customized Cybersecurity Lab Environment Using Hardware Virtualization and Containerization

    Thumbnail
    View/Open
    Final Report-Customizing a Cybersecurity Lab Environment-18-Dec-2021.pdf (12.09Mb)
    Date
    2021-12-18
    Author
    Aunik, Adnan Ashker
    Metadata
    Show full item record
    Abstract
    One of the primary topics to be concerned about in this digital era of the twenty-first century is cybersecurity. The fast advancement of technology, as well as the widespread availability of the Internet, has broadened the scope of cyber attacks. Due to a lack of skilled cybersecurity professionals, several institutions in Bangladesh are providing cybersecurity courses as part of their graduate programs, allowing students to learn cybersecurity skills and develop careers in the field. Students learn how to defend computer operating systems, networks, and data against cyberattacks in a graduate level cybersecurity course. They also learn how to keep track of systems and respond to security incidents. Instructors frequently feel the need for a hands-on lab environment for their students to put what they have learned in the classroom into practice. To have a clear understanding and develop appropriate abilities in cybersecurity, students must have the chance to undertake real lab work as part of their learning process. The objectives of this project is to establish a cybersecurity lab environment for a generic graduate or postgraduate level cybersecurity education leveraging the benefits of hardware virtualization and containerization. Because the software applications used in cybersecurity lab exercises aren't always trusted, hardware virtualization technologies will be employed to separate the lab environment from the host system. If a guest system is compromised while doing a cybersecurity lab exercise, the snapshot function of the hypervisor software used in hardware virtualization will be deployed to restore the guest machine to its former state. On top of the guest computer, containerization technology will be deployed to offer numerous virtual machines for each student participating in a cybersecurity lab exercise. Containers will make optimal use of resources and eliminate the need for virtual machines to boot up.
    URI
    http://dspace.uiu.ac.bd/handle/52243/2288
    Collections
    • M.Sc Thesis/Project [126]

    Copyright 2003-2017 United International University
    Contact Us | Send Feedback
    Developed by UIU CITS
     

     

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Copyright 2003-2017 United International University
    Contact Us | Send Feedback
    Developed by UIU CITS