首页> 外文学位 >Assessing and Developing Two Educational Tools on ARP Spoofing Attacks
【24h】

Assessing and Developing Two Educational Tools on ARP Spoofing Attacks

机译:评估和开发两种针对ARP欺骗攻击的教育工具

获取原文
获取原文并翻译 | 示例

摘要

According to the Verizon's Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker's Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is a hands-on (HandsOn) tool that asks students to perform an ARP Spoofing Attack by manually creating ARP reply packets. It was demonstrated in previous research that both tools enhanced students' learning.;In this paper, we are going to scientifically evaluate and compare the effectiveness of these two tools. We divided the class of forty-five students randomly into two groups. Group A was assigned HGUI lab and Group B was assigned the HandsOn lab. The labs were assigned as a one and half week homework assignments. Both groups were given a pre-survey and a pre-quiz before the lab. After they submitted the lab, we gave them a post-survey and a post quiz. The analysis shows that prior to the labs, students in both groups have almost identical background in the knowledge of ARP Spoofing. After the lab, both groups made statistically significant improvements. Although Group A did statistically better on the survey and Group B did better on the quiz, it is not statistically significant enough to draw a definitive conclusion according to the student's t-test result. Also, in analyzing survey results, we found that actively reading cyber security related articles is a more significant contributing factor in students' knowledge in the subject matter than other factors including having formal training or taking cyber security classes.
机译:根据Verizon的数据泄露调查报告,局域网(LAN)访问是内部威胁和滥用的最主要手段。对学生来说,学习这些漏洞,了解攻击机制并了解对策至关重要。北卡罗莱纳州A&T州立大学计算机科学系设计了两种不同的教育工具,可以帮助学生学习ARP欺骗攻击,这是LAN上最流行的攻击。第一个工具称为黑客的图形用户界面(HGUI),是一种可视化工具,可通过实时动画演示ARP欺骗攻击。第二个工具是动手操作(HandsOn)工具,它要求学生通过手动创建ARP回复数据包来执行ARP欺骗攻击。先前的研究表明,这两种工具都可以增强学生的学习能力。在本文中,我们将科学评估和比较这两种工具的有效性。我们将四十五名学生的班级随机分为两组。 A组被分配了HGUI实验室,B组被分配了动手实验室。实验室被分配为一个半星期的家庭作业。在实验前,两组均接受了预调查和测验。他们提交实验后,我们给了他们调查后和测验。分析表明,在进行实验之前,两组学生在ARP欺骗方面的知识几乎相同。实验结束后,两组均在统计学上有显着改善。尽管A组在调查中的统计结果更好,而B组在测验中的表现更好,但是根据学生的t检验结果,它在统计学上还不足以得出明确的结论。另外,在分析调查结果时,我们发现,积极阅读网络安全相关文章比其他正式培训或参加网络安全课程等其他因素对学生在主题知识方面的贡献更大。

著录项

  • 作者

    Brown, Ariana.;

  • 作者单位

    North Carolina Agricultural and Technical State University.;

  • 授予单位 North Carolina Agricultural and Technical State University.;
  • 学科 Computer science.
  • 学位 M.S.
  • 年度 2018
  • 页码 45 p.
  • 总页数 45
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号