Open Access

Research on the Path of Improving Network Attack and Defense Ability of Students in Applied Colleges and Universities Based on Information Security Technology

,  and   
Jun 05, 2025

Cite
Download Cover

Ghiasi, M., Niknam, T., Wang, Z., Mehrandezh, M., Dehghani, M., & Ghadimi, N. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research, 215, 108975. GhiasiM., NiknamT., WangZ., MehrandezhM., DehghaniM. & GhadimiN. (2023). A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: Past, present and future. Electric Power Systems Research, 215, 108975.Search in Google Scholar

Agrawal, N., & Tapaswi, S. (2019). Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 21(4), 3769-3795. AgrawalN. & TapaswiS. (2019). Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials, 21(4), 3769-3795.Search in Google Scholar

Kalkan, K., Gur, G., & Alagoz, F. (2017). Defense mechanisms against DDoS attacks in SDN environment. IEEE Communications Magazine, 55(9), 175-179. KalkanK., GurG. & AlagozF. (2017). Defense mechanisms against DDoS attacks in SDN environment. IEEE Communications Magazine, 55(9), 175-179.Search in Google Scholar

Andreatos, A. S. (2017, April). Designing educational scenarios to teach network security. In 2017 IEEE Global Engineering Education Conference (EDUCON) (pp. 1606-1610). IEEE. AndreatosA. S. (2017, April). Designing educational scenarios to teach network security. In 2017 IEEE Global Engineering Education Conference (EDUCON) (pp. 1606-1610). IEEE.Search in Google Scholar

Wu, J., Song, T., Yu, Y., Wang, C., & Hu, J. (2018). Generalized byzantine attack and defense in cooperative spectrum sensing for cognitive radio networks. IEEE Access, 6, 53272-53286. WuJ., SongT., YuY., WangC. & HuJ. (2018). Generalized byzantine attack and defense in cooperative spectrum sensing for cognitive radio networks. IEEE Access, 6, 53272-53286.Search in Google Scholar

Vekaria, K. B., Calyam, P., Wang, S., Payyavula, R., Rockey, M., & Ahmed, N. (2021). Cyber range for research-inspired learning of “attack defense by pretense” principle and practice. IEEE Transactions on Learning Technologies, 14(3), 322-337. VekariaK. B., CalyamP., WangS., PayyavulaR., RockeyM. & AhmedN. (2021). Cyber range for research-inspired learning of “attack defense by pretense” principle and practice. IEEE Transactions on Learning Technologies, 14(3), 322-337.Search in Google Scholar

Zhang, X., & Zitnik, M. (2020). Gnnguard: Defending graph neural networks against adversarial attacks. Advances in neural information processing systems, 33, 9263-9275. ZhangX. & ZitnikM. (2020). Gnnguard: Defending graph neural networks against adversarial attacks. Advances in neural information processing systems, 33, 9263-9275.Search in Google Scholar

Liu, S. Z., Shao, C. W., Li, Y. F., & Yang, Z. (2021). Game attack–defense graph approach for modeling and analysis of cyberattacks and defenses in local metering system. IEEE Transactions on Automation Science and Engineering, 19(3), 2607-2619. LiuS. Z., ShaoC. W., LiY. F. & YangZ. (2021). Game attack–defense graph approach for modeling and analysis of cyberattacks and defenses in local metering system. IEEE Transactions on Automation Science and Engineering, 19(3), 2607-2619.Search in Google Scholar

Wang, S., Sun, J., Zhang, J., Dong, Q., Gu, X., & Chen, C. (2023). Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes. International Journal of Critical Infrastructure Protection, 40, 100583. WangS., SunJ., ZhangJ., DongQ., GuX. & ChenC. (2023). Attack-Defense game analysis of critical infrastructure network based on Cournot model with fixed operating nodes. International Journal of Critical Infrastructure Protection, 40, 100583.Search in Google Scholar

Liao, X. (2021). Course Construction of Network Attack and Defense Based on “Four in One” Teaching Mode. Learning & Education, 10(4), 222-223. LiaoX. (2021). Course Construction of Network Attack and Defense Based on “Four in One” Teaching Mode. Learning & Education, 10(4), 222-223.Search in Google Scholar

Shuhua, W. E. N., & Ruijin, W. A. N. G. (2018). Comprehensive Experimental Design of Network Attack and DefenseBased on IPC Pipeline. Experiment Science and Technology, 16(5), 109-113. ShuhuaW. E. N. & RuijinW. A. N. G. (2018). Comprehensive Experimental Design of Network Attack and DefenseBased on IPC Pipeline. Experiment Science and Technology, 16(5), 109-113.Search in Google Scholar

Dong, C., & Zhao, L. (2019). Sensor network security defense strategy based on attack graph and improved binary PSO. Safety science, 117, 81-87. DongC. & ZhaoL. (2019). Sensor network security defense strategy based on attack graph and improved binary PSO. Safety science, 117, 81-87.Search in Google Scholar

Tan, J., Jin, H., Hu, H., Hu, R., Zhang, H., & Zhang, H. (2022). WF-MTD: Evolutionary decision method for moving target defense based on wright-fisher process. IEEE transactions on dependable and secure computing, 20(6), 4719-4732. TanJ., JinH., HuH., HuR., ZhangH. & ZhangH. (2022). WF-MTD: Evolutionary decision method for moving target defense based on wright-fisher process. IEEE transactions on dependable and secure computing, 20(6), 4719-4732.Search in Google Scholar

Gautam, M., & Prabhakar, G. (2023). Identification of network security issues and challenges in defense environments. Int. J. Eng. Manag. Technol. GautamM. & PrabhakarG. (2023). Identification of network security issues and challenges in defense environments. Int. J. Eng. Manag. Technol.Search in Google Scholar

Miehling, E., Rasouli, M., & Teneketzis, D. (2018). A POMDP approach to the dynamic defense of large-scale cyber networks. IEEE Transactions on Information Forensics and Security, 13(10), 2490-2505. MiehlingE., RasouliM. & TeneketzisD. (2018). A POMDP approach to the dynamic defense of large-scale cyber networks. IEEE Transactions on Information Forensics and Security, 13(10), 2490-2505.Search in Google Scholar

Trabelsi, Z., & Saleous, H. (2019, April). Exploring the opportunities of cisco packet tracer for hands-on security courses on firewalls. In 2019 IEEE Global Engineering Education Conference (EDUCON) (pp. 411-418). IEEE. TrabelsiZ. & SaleousH. (2019, April). Exploring the opportunities of cisco packet tracer for hands-on security courses on firewalls. In 2019 IEEE Global Engineering Education Conference (EDUCON) (pp. 411-418). IEEE.Search in Google Scholar

Trabelsi, Z., Al Matrooshi, M., & Al Bairaq, S. (2016, September). A Smartphone App for Enhancing Students’ Hands-on Learning on Network and DoS Attacks Traffic Generation. In Proceedings of the 17th Annual Conference on Information Technology Education (pp. 48-53). TrabelsiZ., Al MatrooshiM. & Al BairaqS. (2016, September). A Smartphone App for Enhancing Students’ Hands-on Learning on Network and DoS Attacks Traffic Generation. In Proceedings of the 17th Annual Conference on Information Technology Education (pp. 48-53).Search in Google Scholar

Yoon, C., Lee, S., Kang, H., Park, T., Shin, S., Yegneswaran, V., ... & Gu, G. (2017). Flow wars: Systemizing the attack surface and defenses in software-defined networks. IEEE/ACM Transactions on Networking, 25(6), 3514-3530. YoonC., LeeS., KangH., ParkT., ShinS., YegneswaranV. ... & GuG. (2017). Flow wars: Systemizing the attack surface and defenses in software-defined networks. IEEE/ACM Transactions on Networking, 25(6), 3514-3530.Search in Google Scholar

Chain, K., Kuo, C. C., Liu, I. H., Li, J. S., & Yang, C. S. (2018, April). Design and implement of capture the flag based on cloud offense and defense platform. In 2018 IEEE International Conference on Applied System Invention (ICASI) (pp. 686-689). IEEE. ChainK., KuoC. C., LiuI. H., LiJ. S. & YangC. S. (2018, April). Design and implement of capture the flag based on cloud offense and defense platform. In 2018 IEEE International Conference on Applied System Invention (ICASI) (pp. 686-689). IEEE.Search in Google Scholar

Kranch, M. (2019, June). Why you should start with the offense: How to best teach cybersecurity’s core concepts. In Colloquium for Information Systems Security Education (Vol. 23, No. 1, pp. 1-12). KranchM. (2019, June). Why you should start with the offense: How to best teach cybersecurity’s core concepts. In Colloquium for Information Systems Security Education (Vol. 23, No. 1, pp. 1-12).Search in Google Scholar

Qiu, S., Liu, Q., Zhou, S., & Wu, C. (2019). Review of artificial intelligence adversarial attack and defense technologies. Applied Sciences, 9(5), 909. QiuS., LiuQ., ZhouS. & WuC. (2019). Review of artificial intelligence adversarial attack and defense technologies. Applied Sciences, 9(5), 909.Search in Google Scholar

Trabelsi, Z., McCoey, M., & Wang, Y. (2020). Teaching Offensive Lab Skills: How to Make It Worth the Risk?. In Handbook of Research on Diverse Teaching Strategies for the Technology-Rich Classroom (pp. 138-152). IGI Global. TrabelsiZ., McCoeyM. & WangY. (2020). Teaching Offensive Lab Skills: How to Make It Worth the Risk?. In Handbook of Research on Diverse Teaching Strategies for the Technology-Rich Classroom (pp. 138-152). IGI Global.Search in Google Scholar

Shebaro, B. (2020). SYN, SYN-ACK, and beyond: learning by networking. Journal of Computing Sciences in Colleges, 35(7), 44-51. ShebaroB. (2020). SYN, SYN-ACK, and beyond: learning by networking. Journal of Computing Sciences in Colleges, 35(7), 44-51.Search in Google Scholar

Khalaf, B. A., Mostafa, S. A., Mustapha, A., Mohammed, M. A., & Abduallah, W. M. (2019). Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access, 7, 51691-51713. KhalafB. A., MostafaS. A., MustaphaA., MohammedM. A. & AbduallahW. M. (2019). Comprehensive review of artificial intelligence and statistical approaches in distributed denial of service attack and defense methods. IEEE Access, 7, 51691-51713.Search in Google Scholar

Parker, T., Jones, J., Mayberry, J., Chanman, G., Staples, Z., McEachen, J., & Tummala, M. (2016, January). Defensive cyber operations in a software-defined network. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5561-5568). IEEE. ParkerT., JonesJ., MayberryJ., ChanmanG., StaplesZ., McEachenJ. & TummalaM. (2016, January). Defensive cyber operations in a software-defined network. In 2016 49th Hawaii International Conference on System Sciences (HICSS) (pp. 5561-5568). IEEE.Search in Google Scholar

Kohout, D., Lazarov, W., Lieskovan, T., & Mlynek, P. (2024, July). Sandbox Environment for Offensive and Defensive Training in Smart Metering. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (pp. 43-55). Singapore: Springer Nature Singapore. KohoutD., LazarovW., LieskovanT. & MlynekP. (2024, July). Sandbox Environment for Offensive and Defensive Training in Smart Metering. In International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems (pp. 43-55). Singapore: Springer Nature Singapore.Search in Google Scholar

Zhijun, W., Wenjing, L., Liang, L., & Meng, Y. (2020). Low-rate DoS attacks, detection, defense, and challenges: A survey. IEEE access, 8, 43920-43943. ZhijunW., WenjingL., LiangL. & MengY. (2020). Low-rate DoS attacks, detection, defense, and challenges: A survey. IEEE access, 8, 43920-43943.Search in Google Scholar

Liu, Z. (2021, June). The construction of campus network security system based on the actual network offensive and defensive environment. In 2021 International Conference on Computer Engineering and Application (ICCEA) (pp. 515-518). IEEE. LiuZ. (2021, June). The construction of campus network security system based on the actual network offensive and defensive environment. In 2021 International Conference on Computer Engineering and Application (ICCEA) (pp. 515-518). IEEE.Search in Google Scholar

Zhang, H., Liu, B., & Wu, H. (2021). Smart grid cyber-physical attack and defense: A review. IEEE Access, 9, 29641-29659. ZhangH., LiuB. & WuH. (2021). Smart grid cyber-physical attack and defense: A review. IEEE Access, 9, 29641-29659.Search in Google Scholar

Han, D., Li, A., Zhang, L., Zhang, Y., Li, J., Li, T., ... & Zhang, Y. (2021). Deep learning-guided jamming for cross-technology wireless networks: Attack and defense. IEEE/ACM Transactions on Networking, 29(5), 1922-1932. HanD., LiA., ZhangL., ZhangY., LiJ., LiT. ... & ZhangY. (2021). Deep learning-guided jamming for cross-technology wireless networks: Attack and defense. IEEE/ACM Transactions on Networking, 29(5), 1922-1932.Search in Google Scholar

Kim, K., Kim, J. S., Jeong, S., Park, J. H., & Kim, H. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & security, 103, 102150. KimK., KimJ. S., JeongS., ParkJ. H. & KimH. K. (2021). Cybersecurity for autonomous vehicles: Review of attacks and defense. Computers & security, 103, 102150.Search in Google Scholar

Rosenberg, I., Shabtai, A., Elovici, Y., & Rokach, L. (2021). Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Computing Surveys (CSUR), 54(5), 1-36. RosenbergI., ShabtaiA., EloviciY. & RokachL. (2021). Adversarial machine learning attacks and defense methods in the cyber security domain. ACM Computing Surveys (CSUR), 54(5), 1-36.Search in Google Scholar

Swami, R., Dave, M., & Ranga, V. (2019). Software-defined networking-based DDoS defense mechanisms. ACM Computing Surveys (CSUR), 52(2), 1-36. SwamiR., DaveM. & RangaV. (2019). Software-defined networking-based DDoS defense mechanisms. ACM Computing Surveys (CSUR), 52(2), 1-36.Search in Google Scholar

Zhang, H. (2020). The Exploration and Research of the Network Security Offense and Defense Laboratory Cooperated by Schools and Enterprises under the Background of New Engineeringu. Frontiers in Educational Research, 3(5). ZhangH. (2020). The Exploration and Research of the Network Security Offense and Defense Laboratory Cooperated by Schools and Enterprises under the Background of New Engineeringu. Frontiers in Educational Research, 3(5).Search in Google Scholar

Legg, P., Mills, A., & Johnson, I. (2023, March). Teaching offensive and defensive cyber security in schools using a raspberry pi cyber range. In Journal of The Colloquium for Information Systems Security Education (Vol. 10, No. 1, pp. 9-9). LeggP., MillsA. & JohnsonI. (2023, March). Teaching offensive and defensive cyber security in schools using a raspberry pi cyber range. In Journal of The Colloquium for Information Systems Security Education (Vol. 10, No. 1, pp. 9-9).Search in Google Scholar

Lamour, J. (2017). USE OF VIRTUALIZATION TO TEACH INFOSEC PRACTITIONERS OFFENSIVE AND DEFENSIVE SECURITY. In ICERI2017 Proceedings (pp. 7838-7844). IATED. LamourJ. (2017). USE OF VIRTUALIZATION TO TEACH INFOSEC PRACTITIONERS OFFENSIVE AND DEFENSIVE SECURITY. In ICERI 2017 Proceedings (pp. 7838-7844). IATED.Search in Google Scholar

Trabelsi, Z., Parambil, M. M. A., Qayyum, T., & Alomar, B. (2024, May). Teaching DNS Spoofing Attack Using a Hands-on Cybersecurity Approach Based on Virtual Kali Linux Platform. In 2024 IEEE Global Engineering Education Conference (EDUCON) (pp. 1-8). IEEE. TrabelsiZ., ParambilM. M. A., QayyumT. & AlomarB. (2024, May). Teaching DNS Spoofing Attack Using a Hands-on Cybersecurity Approach Based on Virtual Kali Linux Platform. In 2024 IEEE Global Engineering Education Conference (EDUCON) (pp. 1-8). IEEE.Search in Google Scholar

Bardas, A. G., & Ou, X. (2013). Setting up and using a cyber security lab for education purposes. Journal of Computing Sciences in Colleges, 28(5), 191-197. BardasA. G. & OuX. (2013). Setting up and using a cyber security lab for education purposes. Journal of Computing Sciences in Colleges, 28(5), 191-197.Search in Google Scholar

Kuo, C. C., Chain, K., & Yang, C. S. (2018). Cyber attack and defense training: Using emulab as a platform. Int. J. Innov. Comput. Inf. Control, 14(6), 2245-2258. KuoC. C., ChainK. & YangC. S. (2018). Cyber attack and defense training: Using emulab as a platform. Int. J. Innov. Comput. Inf. Control, 14(6), 2245-2258.Search in Google Scholar

Yue Xiao & Xiaojun Zhang. (2024). Degree Distribution of Evolving Network with Node Preference Deletion. Mathematics(23), 3808-3808. XiaoYue & ZhangXiaojun. (2024). Degree Distribution of Evolving Network with Node Preference Deletion. Mathematics(23), 3808-3808.Search in Google Scholar

Wang Hai-Xia, Lu Qi-Shao & Shi Xia. (2012). Comparison of Synchronization Ability of Four Types of Regular Coupled Networks. Communications in Theoretical Physics(5), 681-685. Hai-XiaWang, Qi-ShaoLu & XiaShi. (2012). Comparison of Synchronization Ability of Four Types of Regular Coupled Networks. Communications in Theoretical Physics(5), 681-685.Search in Google Scholar

Brunstein Maia, Wicker Kai, Hérault Karine, Heintzmann Rainer & Oheim Martin. (2013). Full-field dual-color 100-nm super-resolution imaging reveals organization and dynamics of mitochondrial and ER networks. Optics express(22), 26162-73. MaiaBrunstein, KaiWicker, KarineHérault, RainerHeintzmann & MartinOheim. (2013). Full-field dual-color 100-nm super-resolution imaging reveals organization and dynamics of mitochondrial and ER networks. Optics express(22), 26162-73.Search in Google Scholar

Department of Biology, Boston College, Chestnut Hill, Massachusetts., 2 Laboratoire d’Informatique (LIX), Ecole Polytechnique, Palaiseau, France. & 1 Department of Biology, Boston College, Chestnut Hill, Massachusetts. (2019). Small-World Networks and RNA Secondary Structures. Journal of computational biology: a journal of computational molecular cell biology(1), 16-26. Department of Biology, Boston College, Chestnut Hill, Massachusetts., 2 Laboratoire d’Informatique (LIX), Ecole Polytechnique, Palaiseau, France. & 1 Department of Biology, Boston College, Chestnut Hill, Massachusetts. (2019). Small-World Networks and RNA Secondary Structures. Journal of computational biology: a journal of computational molecular cell biology(1), 16-26.Search in Google Scholar

Language:
English