130 likes | 200 Views
Explore the IWAR Range, a network designed for educational purposes and defense of U.S. objectives. Learn about different types of warfare, setting up the lab, classroom use, and more. Discover how it prepares future military leaders and tackles ethical issues in cybersecurity.
E N D
The IWAR Range: a Laboratory for Undergraduate Information Assurance Education By Maj. Joseph Schafer (Naval War College), Daniel J. Ragsdale and John R. Surdu (Information Technology and Operations Center, USMA), and Curtis A Carver (Texas A & M University) Presented by Allen Stone
Information Warfare “Any electronic attack intended to disrupt a computer system” – Panda and Yalamanchili • IWAR Range: Attack/Defend Network for Educational Purposes • Very Literal Significance: The Defense of the United States
Objectives • Types of Warfare • Analog vs. Electronic • The Lab • Background • Setup • Classroom Use • Process to Create a Range • Future Work • Information Warfare Example (Black Hat)
Types of Warfare • Military • “Nationalism” • Criminal • Industrial • Convoluted • “Idealism” • Juvenile
IWAR range • Information Warfare Analysis and Research Laboratory • Isolated Laboratory • Heterogeneous • Modeled After Production Systems • Exploits and Tools are Weapons
Background • Technology • Overly Prepared or Not Utilizing What is There • Y2K • Information Assurance Course (USMA) • Future Military Leaders • Know Your Enemy • Ethical Issues with Malicious Coding
Electronic “Range” • Conventional Weapon Range • Inside vs. Outside • 4 Networks • Gray (Attack) • Gold (Target) • Green (Tactical Command) • Black (Faculty Research)
The Making of IWAR • Minimize Misuse • Isolation • On-Hand Resources • Rescued Machines • Search Boxes • Compressed Time Table • All in One Lab • Divided Room • KVM Switches • Services • Total Cost: $20,000
IWAR Lite • 1:10 Cost-Value Ratio could have been even better • Rescued Systems • OS Costs • Abbreviated Architecture
Worth the Effort? • Hands-On vs. PowerPoint and Whiteboard • Cadets Also Must Learn Defense • Largely Positive Feedback
Future Work • Branching Out • Rebuilding IWAR • ACM Chapter • Fun, Unthreatening, Un-Graded
The Middle East Cyberwar - 2001 • Web Defacement and Denial of Service • Propaganda • Poisoned Pen Tactics • Less than 100 Core Hackers • Thousands of Volunteers and Conscripts • Emotional, Ideological, Patriotic, Religious • Israel, Palestine, Iran, Lebanon, Malaysia, Qatar, U.A.E., U.S. • Spread
References • “The IWAR Range: A Laboratory for Undergraduate Information Assurance Education” – Schafer, Ragsdale, Surdu, and Carver – “Proceedings of the Sixth Annual CCSC Northeastern Conference on the Journal of Computing in Small Colleges” – Consortium for Computing Sciences in Colleges • “Cyber Jihad and the Globalization of Warfare: Computer Networks as a Battle Ground in the Middle East andBeyond” – Kenneth Geers (NCIS) and Dr. Peter Feaver (Duke University) – Black Hat USA 2004 Briefings and Training, July 24-29, Las Vegas, NV • “Transaction Fusion in the Wake of Information Warfare” – Brajendra Panda and Rajesh Yalamanchili (University of North Dakota) – Proceedings of the 2001 ACM Symposium on Applied Computing – ACM Special Interest Group on Applied Computing