DocumentCode :
1852545
Title :
Research on Developing a Lab Environment for Cookie Spoofing Attack and Defense Education
Author :
Huangcun Zeng
Author_Institution :
Dept. of Inf. Technol., Guangdong Teachers Coll. of Foreign Language & Arts, Guangzhou, China
fYear :
2013
fDate :
21-23 June 2013
Firstpage :
1979
Lastpage :
1982
Abstract :
Cookie spoofing is a common network attack. It´s a must for web site administrators to protect their web sites from cookie spoofing attacks. In order to let the students in higher vocational colleges master the attack and defense skills of cookie spoofing, it´s essential to let them have the opportunity to truly practice the attacking behaviors as hackers do, and to practice the defense countermeasures as web site administrators do. In this paper, we have developed a lab environment for cookie spoofing attack and defense education in higher vocational colleges. Our experience shows that higher vocational college students can better understand what cookie spoofing is, how hackers perform cookie spoofing attacks, why they can do so, and finally how to prevent cookie spoofing attacks. We suggest that a lot more researches need to be done in the area of developing attack and defense lab environments in order to improve the outcomes of network security education in higher vocational colleges. Results can be useful for similar education activities at other schools.
Keywords :
Web sites; computer network security; computer science education; educational institutions; further education; vocational training; Web site administrators; Web site protection; attack and defense lab environments; attacking behaviors; cookie spoofing attack education; cookie spoofing attack skills; cookie spoofing defence education; cookie spoofing defense skills; education activities; higher vocational college students; lab environment; network attack; network security education; Computer hacking; Educational institutions; Web pages; Web servers; attack; cookie spoofing; defense; higher vocational college; lab environment; network security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on
Conference_Location :
Shiyang
Type :
conf
DOI :
10.1109/ICCIS.2013.517
Filename :
6643436
Link To Document :
بازگشت