lab
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
lab [2019/12/04 11:35] – ggankhuyag | lab [2020/04/20 15:14] – ggankhuyag | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | The security lab has three subsystems that support research and teaching activities at the TU/e Mathematics and Computer Science department. | + | The security lab has three subsystems that support research and teaching activities at the TU/e Mathematics and Computer Science department. |
====== Security Operation Center (SOC) ====== | ====== Security Operation Center (SOC) ====== | ||
Line 5: | Line 6: | ||
SOC is a centralized unit that monitors the security state of a computer network. In the lab, the initial scope of the SOC includes two areas to monitor: the IT network of the department (Office); the cyber-physical sensors network of the university (Building/ | SOC is a centralized unit that monitors the security state of a computer network. In the lab, the initial scope of the SOC includes two areas to monitor: the IT network of the department (Office); the cyber-physical sensors network of the university (Building/ | ||
- | {{ : | + | {{ : |
+ | |||
+ | We allow students to conduct interesting experiment activities using the SOC. The activities include followings: | ||
+ | * In 2IMS20 (Cyberattacks, | ||
+ | |||
+ | {{: | ||
+ | {{ : | ||
+ | |||
+ | |||
+ | |||
+ | ====== IoT Lab ====== | ||
+ | |||
+ | The lab also has a strong IoT component that allows testing new attacks and malware (e.g. for IoT botnet-based bitcoin mining). A board in the lab will allow adding and physically operating on new components. As an example, you find below the first BACnet components schematics. | ||
+ | |||
+ | {{ : | ||
- | We allow students to conduct interesting experiments using the SOC. For instance, students, as analysts, are assigned to detect and analyze suspicious events or attacks from the network traffic by reconstructing the evidence. | ||
====== The BlackHat' | ====== The BlackHat' | ||
Line 26: | Line 40: | ||
{{ : | {{ : | ||
- | ====== IoT Lab ====== | ||
- | |||
- | The lab also has a strong IoT component that allows testing new attacks and malware (e.g. for IoT botnet-based bitcoin mining). A board in the lab will allow adding and physically operating on new components. As an example, you find below the first BACnet components schematics. | ||
- | |||
- | {{ : | ||
======Lab access====== | ======Lab access====== |
lab.txt · Last modified: 2023/06/01 16:56 by ggankhuyag