TY - GEN
T1 - Using network packet generators and snort rules for teaching denial of service attacks
AU - Trabelsi, Zouheir
AU - Alketbi, Latifa
PY - 2013
Y1 - 2013
N2 - Teaching ethical hacking techniques is fundamental to security education and allows students to better understand the ways in which computer and network systems fail. This paper discusses the implementation of comprehensive offensive hands-on lab exercises about four common Denial of Service (DoS) attacks. Moreover, the paper discusses the implementation of a defense technique against the DoS attacks using Snort tool, as an intrusion detection system. The impact of offering the exercises on the student performance in terms of achieving the course outcomes is also discussed. Although a significant improvement in the student performance has been observed, a major ethical concern has been identified when teaching ethical hacking techniques. As a consequence, the paper lists a number of steps that should be taken by schools and educators to reduce the liability of teaching ethical hacking techniques in information security curriculum.
AB - Teaching ethical hacking techniques is fundamental to security education and allows students to better understand the ways in which computer and network systems fail. This paper discusses the implementation of comprehensive offensive hands-on lab exercises about four common Denial of Service (DoS) attacks. Moreover, the paper discusses the implementation of a defense technique against the DoS attacks using Snort tool, as an intrusion detection system. The impact of offering the exercises on the student performance in terms of achieving the course outcomes is also discussed. Although a significant improvement in the student performance has been observed, a major ethical concern has been identified when teaching ethical hacking techniques. As a consequence, the paper lists a number of steps that should be taken by schools and educators to reduce the liability of teaching ethical hacking techniques in information security curriculum.
KW - Course outcomes assessment
KW - DoS attacks
KW - Ethical concern
KW - Ethical hacking
KW - Information security curriculum
KW - School liability
KW - Snort rules
UR - http://www.scopus.com/inward/record.url?scp=84881149246&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84881149246&partnerID=8YFLogxK
U2 - 10.1145/2462476.2465580
DO - 10.1145/2462476.2465580
M3 - Conference contribution
AN - SCOPUS:84881149246
SN - 9781450320788
T3 - Annual Conference on Innovation and Technology in Computer Science Education, ITiCSE
SP - 285
EP - 290
BT - ITiCSE 2013 - Proceedings of the ACM Conference on Innovation and Technology in Computer Science Education
T2 - 18th ACM Conference on Innovation and Technology in Computer Science Education, ITiCSE 2013
Y2 - 1 July 2013 through 3 July 2013
ER -