Abstract
Smooth Wall Express [12] is a free GPL firewall. It uses iptables [20] for firewall rules and Snort [14] as an intrusion detection system (IDS). This paper describes the installation of Smooth Wall. It presents sample SmoothWall laboratory exercises for teaching network security using iptables and Snort.
- Apache HTTP Server, http://httpd.apache.org/download.cgi, retrieved May 31, 2005.Google Scholar
- Carlson, D., Teaching computer security, ACM SIGCSE Bulletin, 36 (2), 64--76, 2004. Google ScholarDigital Library
- CLICS: A Computational Laboratory for Information and Computer Security, http://clics.cs.uwec.edu/workshopmaterials.htm, retrieved May 31, 2005.Google Scholar
- Comparison of SmoothWall Corporate Server Version 3.0 and Express Version 2.0, http://download.SmoothWall.org/archive/docs/promo/CorporateServer_vs_Expre ss_Comparison_20040113.pdf, retrieved May 31, 2005.Google Scholar
- Frank, C., Wells, G., Laboratory exercises for a computer security course, Journal of Computing Sciences in Colleges, 17 (4), 51--54, 2002. Google ScholarDigital Library
- Koziol, J, Intrusion Detection with Snort, Sams, 2003. Google ScholarDigital Library
- Mateti, P., A laboratory-based course in internet security, Proceeding of the 34th SIGCSE technical symposium on Computer science education, 252--256, 2003. Google ScholarDigital Library
- PuTTY Download Page, http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html, retrieved May 31, 2005.Google Scholar
- Smooth Wall Express, http://www.SmoothWall.org.Google Scholar
- SmoothWall Express 2.0 Installation Guide, http://download.SmoothWall.org/archive/docs/2.0/install.pdf, retrieved May 31, 2005.Google Scholar
- SmoothWall History, http://SmoothWall.org/about/release/history.html, retrieved May 31, 2005.Google Scholar
- SmoothWall Ltd., http://www.SmoothWall.org.Google Scholar
- SmoothWall Source Code, http://www.SmoothWall.org/get/.Google Scholar
- Snort, http://www.snort.org.Google Scholar
- VMware, http://www.vmware.com.Google Scholar
- Wagner, P. and Wudi, J., Designing and implementing a cyberware laboratory exercise for a computer security course, Proceedings of the 35th SIGCSE technical symposium on Computer science education, 402-6, 2004. Google ScholarDigital Library
- Walden, J., A Real-Time Information Warfare Exercise on a Virtual Network, Proceedings of the Thirty-Sixth SIGCSE Technical Symposium on Computer Science Education, 86--90, 2005. Google ScholarDigital Library
- Werner, L, Teaching principled and practical Information security, Journal of Computing Sciences in Colleges, 20 (1), 81--89, 2004. Google ScholarDigital Library
- Wulf, T, Implementing a minimal lab for an undergraduate network security course, Journal of Computing Sciences in Colleges, 19 (1), 94--98, 2003. Google ScholarDigital Library
- Ziegler, R., Linux Firewalls, 2nd ed., Sams, 2001. Google ScholarDigital Library
Index Terms
- Network security laboratories using SmoothWall
Recommendations
Malicious Bots Threaten Network Security
Viruses, worms, Trojan horses, and network intrusions are among the threats that security administrators worry about on a regular basis. However, there is a less familiar threat that many experts say could be just as dangerous: malicious bot software. A ...
Design of network security projects using honeypots
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an ...
Comments