User Tools

Site Tools


lab

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
lab [2020/04/20 14:22]
ggankhuyag
lab [2020/04/20 15:14] (current)
ggankhuyag
Line 6: Line 6:
 SOC is a centralized unit that monitors the security state of a computer network. In the lab, the initial scope of the SOC includes two areas to monitor: the IT network of the department (Office); the cyber-physical sensors network of the university (Building/​Security). The following figure shows the schematic architecture of the SOC and an overview of the involved systems. SOC is a centralized unit that monitors the security state of a computer network. In the lab, the initial scope of the SOC includes two areas to monitor: the IT network of the department (Office); the cyber-physical sensors network of the university (Building/​Security). The following figure shows the schematic architecture of the SOC and an overview of the involved systems.
  
-{{ :​labs:​soc-overview.png?​nolink&​500 |}}+{{ :​labs:​soc-overview.png?​nolink&​500 |SOC architecure}}
  
 We allow students to conduct interesting experiment activities using the SOC. The activities include followings: We allow students to conduct interesting experiment activities using the SOC. The activities include followings:
   * In 2IMS20 (Cyberattacks,​ Crime and Defences course), students, as analysts, are assigned to detect and analyze suspicious events or attacks from the network traffic by reconstructing the evidence. ​ The attacks were prepared in advance of the class. During the class, we inject the attacks to the monitored infrastructure of the SOC. This raises alerts along with other normal network traffic events. Students must reconstruct potential attacks by finding attack events from alerts. Furthermore,​ associated information of the attacks, such as victim and attacker IP addresses, has to be discovered by the students. ​   * In 2IMS20 (Cyberattacks,​ Crime and Defences course), students, as analysts, are assigned to detect and analyze suspicious events or attacks from the network traffic by reconstructing the evidence. ​ The attacks were prepared in advance of the class. During the class, we inject the attacks to the monitored infrastructure of the SOC. This raises alerts along with other normal network traffic events. Students must reconstruct potential attacks by finding attack events from alerts. Furthermore,​ associated information of the attacks, such as victim and attacker IP addresses, has to be discovered by the students. ​
  
-{{ :​labs:​student_doing_experiment_with_soc_-_2.jpg}} {{ :​labs:​student_doing_experiment_with_soc_-_1.jpg}} ​+{{:​labs:​student_doing_experiment_with_soc_-_2.jpg?375 }}  
 +{{ :​labs:​student_doing_experiment_with_soc_-_1.jpg?375}} 
  
-  * Pen-testing 
-  * Other project possibilities ​ 
  
  
lab.txt · Last modified: 2020/04/20 15:14 by ggankhuyag