295
Views
1
CrossRef citations to date
0
Altmetric
Articles

PLAYGROUND: preparing students for the cyber battleground

Pages 255-276 | Received 16 Oct 2015, Accepted 07 Dec 2016, Published online: 11 Jan 2017
 

Abstract

Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition, economic analysis, and even human psychology. While an individual may choose to specialize in one of these more narrow elements, there is a pressing need for practitioners that have a solid understanding of the unifying principles of the whole. We created the Playground network simulation tool and used it in the instruction of a network security course to graduate students. This tool was created for three specific purposes. First, it provides simulation sufficiently powerful to permit rigorous study of desired principles while simultaneously reducing or eliminating unnecessary and distracting complexities. Second, it permitted the students to rapidly prototype a suite of security protocols and mechanisms. Finally, with equal rapidity, the students were able to develop attacks against the protocols that they themselves had created. Based on our own observations and student reviews, we believe that these three features combine to create a powerful pedagogical tool that provides students with a significant amount of breadth and intense emotional connection to computer security in a single semester.

Acknowledgements

Thanks to Katie Chang for her help with the literature search and to the various Network Security classes for their willingness to be guinea pigs.

Notes

No potential conflict of interest was reported by the author.

1 Permitting students to send each other this kind of code is obviously dangerous. As stated in the related work section, we run these Playground experiments in virtual machines.

2 The message definition mechanism shown here was not exactly the same in the initial release of Playground. Although similar, it was slightly more complicated and less intuitive. This much better version was implemented for the Fall 2016 course.

3 The data types shown in the examples, e.g. STRING, UINT2, and so forth, are defined by the framework. They are not Python types.

4 Finally in fall 2016, our students actually proposed their transport layer with cryptographically enforced, mutual authentication.

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 539.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.