Skip to main navigation Skip to search Skip to main content

A Design for a Secure Malware Laboratory

  • Xavier Riofrío
  • , Fernando Salinas-Herrera
  • , David Galindo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Malicious software teaching is based on theory, consequently, students do not experiment with real practice. Therefore, when they confront a rising incidence in the real world, the response is not usually at the adequate time neither valuable enough. A practical focus will provide a different understanding of the problem due to the fact that the student will be able to recognise suspicious behaviour. This paper proposes the design of an entire platform that experiments with topics related to malware in a controlled and safe environment. The strategy presented is a virtual machine that integrates tools including Metasploit Framework, vulnerable systems, and software scanners. Besides, a web tutorial is available for user orientation; it incorporates additional exclusive components for Metasploit and a tutorial to develop them.

Original languageEnglish
Title of host publicationInformation and Communication Technologies of Ecuador, TIC.EC 2019
EditorsEfraín Fonseca C, Germania Rodríguez Morales, Marcos Orellana Cordero, Miguel Botto-Tobar, Esteban Crespo Martínez, Andrés Patiño León
PublisherSpringer
Pages273-286
Number of pages14
ISBN (Print)9783030357399
DOIs
StatePublished - 2020
Externally publishedYes
Event6th Conference on Information and Communication Technologies, TIC.EC 2019 - Cuenca, Ecuador
Duration: 27 Nov 201929 Nov 2019

Publication series

NameAdvances in Intelligent Systems and Computing
Volume1099
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference6th Conference on Information and Communication Technologies, TIC.EC 2019
Country/TerritoryEcuador
CityCuenca
Period27/11/1929/11/19

Keywords

  • Course
  • Malware
  • Metasploit
  • Practice
  • Virus

Fingerprint

Dive into the research topics of 'A Design for a Secure Malware Laboratory'. Together they form a unique fingerprint.

Cite this