Skip to main content

Teaching for VPN Information Security Experiment Based on VMware

  • Conference paper
Education and Educational Technology

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 108))

  • 1234 Accesses

Abstract

In the construction of the new information security specialty, practical experiment has an important assistant effect on theory teaching. Students of security specialty should do VPN experiment as VPN is a typical security technique, which can provide secure communication between members of a group through use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. By the use of VMware virtual machine in single PC environment, we simulated enterprise Intranet VPN network solutions so that we reduce the required network devices, improve the abilities of students, and achieve the purpose of accessing Intranet by VPN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Burd, S.D., Gaillard, G., Rooney, E., Seazzu, A.F.: Virtual Computing Laboratories Using VMware Lab Manager. In: System Sciences (HICSS), pp. 1–9 (2011)

    Google Scholar 

  2. Liu, Q., Zheng, W., Song, Y.: Parallel Simulated Annealing Based Time-Lapse Seismic Inversion with VMware Virtual Machine Technology. In: Pacific-Asia Workshop on Computational Intelligence and Industrial Application, PACIIA 2008, vol. 2, pp. 568–572 (2008)

    Google Scholar 

  3. Li, S., Ebringer, T., Boztag, S.: An automatic anti-anti-VMware technique applicable for multi-stage packed malware. Malicious and Unwanted Software, 17–23 (2008)

    Google Scholar 

  4. Joha, A.A., Ben Shatwan, F., Ashibani, M.: Performance Evaluation for Remote Access VPN on Windows Server 2003 and Fedora Core 6. In: 8th Telecommunications in Modern Satellite, Cable and Broadcasting Services, TELSIKS 2007, pp. 587–592 (2007)

    Google Scholar 

  5. Badra, M., Hajjeh, I.: Enabling VPN and Secure Remote Access using TLS Protocol. In: Wireless and Mobile Computing, Networking and Communications (WiMob 2006), pp. 308–314 (2006)

    Google Scholar 

  6. Vinod Chandra, S.S., Nair, A.S.: VPN for remote digital evidence acquisition. In: 2007 IEEE Region 10 Conference on TENCON 2007, pp. 1–4 (2007)

    Google Scholar 

  7. Cai, L., Yu, S.: Research and implementation of remote desktop protocol service over SSL VPN. Services Computing, 502–505 (2004)

    Google Scholar 

  8. Deal, R.: The Complete Cisco VPN Configuration Guide, pp. 23–38. Cisco Press (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, Y., Liu, G., Wang, L., Jia, Z. (2011). Teaching for VPN Information Security Experiment Based on VMware. In: Wang, Y. (eds) Education and Educational Technology. Advances in Intelligent and Soft Computing, vol 108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24775-0_79

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24775-0_79

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24774-3

  • Online ISBN: 978-3-642-24775-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics