lab
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
lab [2019/12/04 11:44] – ggankhuyag | lab [2023/06/01 16:56] (current) – ggankhuyag | ||
---|---|---|---|
Line 6: | Line 6: | ||
SOC is a centralized unit that monitors the security state of a computer network. In the lab, the initial scope of the SOC includes two areas to monitor: the IT network of the department (Office); the cyber-physical sensors network of the university (Building/ | SOC is a centralized unit that monitors the security state of a computer network. In the lab, the initial scope of the SOC includes two areas to monitor: the IT network of the department (Office); the cyber-physical sensors network of the university (Building/ | ||
- | {{ : | + | {{ : |
- | We allow students to conduct interesting | + | We allow students to conduct interesting |
+ | * In 2IMS20 (Cyberattacks, | ||
+ | {{: | ||
+ | {{ : | ||
+ | |||
+ | ====== IoT Lab ====== | ||
+ | |||
+ | The Security cluster IoT lab is a state-of-the-art facility designed to provide students with hands-on experience in developing and implementing security measures in IoT environments. The lab is equipped with several clusters of IoT devices, each with its own unique use case and automation. | ||
+ | The IoT lab is designed with a distributed architecture, | ||
+ | To provide automation and control for the IoT devices in the lab, the lab is also equipped with several smart home automation hubs, namely Amazon Echo, Samsung SmartThings, | ||
+ | |||
+ | |||
+ | {{ : | ||
+ | |||
+ | We have several IoT device clusters as shown in the figure. All the cluster actions are automated with one of the smart hubs. | ||
+ | |||
+ | {{ : | ||
+ | {{: | ||
+ | {{ : | ||
+ | {{ labs: | ||
+ | |||
+ | |||
+ | Overall, the IoT lab is designed to provide students with a realistic and practical environment for learning about security in IoT environments. By connecting IoT devices to smart home automation hubs and the internet, students can explore the potential benefits and challenges of IoT technology, as well as develop their own security solutions for securing IoT devices and data. | ||
====== The BlackHat' | ====== The BlackHat' | ||
- | The B-LAB provides a powerful infrastructure to enable students and researchers alike to experiment with malware, vulnerabilities, and exploits freely. The infrastructure is a setup to assure high isolation from the network environment while allowing remote collaboration from affiliate institutions. | + | The B-LAB provides a powerful infrastructure to enable students and researchers alike to experiment with malware, vulnerabilities and exploits freely. The infrastructure is a setup to assure high isolation from the network environment while allowing remote collaboration from affiliate institutions. |
The lab provides access to APT malware platforms, exploits and exploit kits traded in the underground, | The lab provides access to APT malware platforms, exploits and exploit kits traded in the underground, | ||
Line 27: | Line 49: | ||
{{ : | {{ : | ||
- | |||
- | |||
- | ====== IoT Lab ====== | ||
- | |||
- | The lab also has a strong IoT component that allows testing new attacks and malware (e.g. for IoT botnet-based bitcoin mining). A board in the lab will allow adding and physically operating on new components. As an example, you find below the first BACnet components schematics. | ||
- | |||
- | {{ : | ||
lab.1575456241.txt.gz · Last modified: 2021/01/10 20:59 (external edit)