2017 Principles, Systems and Applications of IP Telecommunications (IPTComm) 2017
DOI: 10.1109/iptcomm.2017.8169747
|View full text |Cite
|
Sign up to set email alerts
|

The Docker Security Playground: A hands-on approach to the study of network security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…In contrast to HTB, we proposed the Docker Security Playground (DSP) [13], a self-hosted cyber range. The local installation is possible because DSP reduces the hardware resource utilization by deploying vulnerable scenarios in lightweight containers.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast to HTB, we proposed the Docker Security Playground (DSP) [13], a self-hosted cyber range. The local installation is possible because DSP reduces the hardware resource utilization by deploying vulnerable scenarios in lightweight containers.…”
Section: Related Workmentioning
confidence: 99%
“…Here, we present a subset of previous works that are the most relevant to the PocketCTF approach. The idea of using LXC containers or Dockers instead of virtual machines for CTF labs has been under research over the last few years [11,30]. More specifically, Irvine et al introduced a framework for parameterizing cybersecurity labs by using Docker containers instead of virtualization technologies [24].…”
Section: Related Workmentioning
confidence: 99%
“…In the past, creating authentic computer security scenarios has been identified as a very demanding and challenging task that requires a great deal of effort from educators and lab personnel [10]. In addition, the learning outcomes from using hands-on practices need to follow curriculum guidelines or frameworks that address the required collaborative activities in cybersecurity within the industry, government, and academic institutions [2,10,11]. What is more, educators are usually in need of a way to provide customized challenges according to the courses and to privately maintain the overall learning process.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…For conducting the learning phase, a variety of implemented challenges were used (Perrone and Romano, 2017) such as Metasploitable [5], damn vulnerable Web application [6] and Webgoat [7]. In our case, we used the challenges presented in Table 1.…”
Section: A Virtual Cybersecurity Learning Environment Based On Capture the Flag Challengesmentioning
confidence: 99%