Changes between Version 6 and Version 7 of DETERIntro


Ignore:
Timestamp:
Sep 25, 2015 4:54:17 PM (9 years ago)
Author:
cristina
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • DETERIntro

    v6 v7  
    99== What is DeterLab? ==
    1010
    11 [https://www.isi.deterlab.net/ DeterLab] is a security and education-enhanced version of [http://www.emulab.net/ Emulab]. Funded by the [http://www.nsf.gov/ National Science Foundation] and the [http://www.dhs.gov/ Department of Homeland Security], DETER is hosted by [http://www.isi.edu/ USC/ISI] and [http://www.berkeley.edu/ UC Berkeley].
     11[https://www.isi.deterlab.net/ DeterLab] is a security and education-enhanced version of [http://www.emulab.net/ Emulab]. Funded by the [http://www.nsf.gov/ National Science Foundation] and the [http://www.dhs.gov/ Department of Homeland Security], DeterLab is hosted by [http://www.isi.edu/ USC/ISI] and [http://www.berkeley.edu/ UC Berkeley].
    1212
    1313     "USC/ISI’s DeterLab (cyber DEfense Technology Experimental Research Laboratory) is a state-of-the-art scientific computing facility for cyber-security researchers engaged in research, development, discovery, experimentation, and testing of innovative cyber-security technology. DeterLab is a shared testbed providing a platform for research in cyber security and serving a broad user community, including academia, industry, and government. To date, DeterLab-based projects have included behavior analysis and defensive technologies including DDoS attacks, worm and botnet attacks, encryption, pattern detection, and intrusion-tolerant storage protocols. [ [http://deter-project.org/about_deterlab 1] ]."
    1414
    15 DETER (like Emulab) offers user accounts with assorted permissions associated with different experiment groups. Each group can have its own preconfigured experimental environments running on Linux, BSD, Windows, or other operating systems. Users running DETER experiments have full control of real hardware and networks running preconfigured software packages. These features make it an ideal platform for computer science and especially computer security education. Many instructors have designed class exercises (homework assignments, project assignments, in-class demos, etc.) consisting of a lab manual, software, data, network configurations, and machines from DETER's pool. This allows each student to run her own experiments on dedicated hardware.
     15DeterLab (like Emulab) offers user accounts with assorted permissions associated with different experiment groups. Each group can have its own preconfigured experimental environments running on Linux, BSD, Windows, or other operating systems. Users running DeterLab experiments have full control of real hardware and networks running preconfigured software packages. These features make it an ideal platform for computer science and especially computer security education. Many instructors have designed class exercises (homework assignments, project assignments, in-class demos, etc.) consisting of a lab manual, software, data, network configurations, and machines from DETER's pool. This allows each student to run her own experiments on dedicated hardware.
    1616
    1717== How does it work? ==
    1818
    19 The software running DETER will load operating system images (low level disk copies) onto to free nodes in the testbed, and then reconfigure programmable switches to create VLANs with the newly-imaged nodes connected according to the topology specified by the experiment creator. After the system is fully imaged and configured, DETER will execute specified scripts, unpack tarballs, and/or install rpm files according to the experiment's configuration. The end result is a live network of real machines, accessible via the Internet.
     19The software running DeterLab will load operating system images (low level disk copies) onto to free nodes in the testbed, and then reconfigure programmable switches to create VLANs with the newly-imaged nodes connected according to the topology specified by the experiment creator. After the system is fully imaged and configured, DeterLab will execute specified scripts, unpack tarballs, and/or install rpm files according to the experiment's configuration. The end result is a live network of real machines, accessible via the Internet.
    2020
    21 == How do I get a DETER login? ==
     21== How do I get a DeterLab login? ==
    2222
    23231. Your instructor will request an account for you. Simply send your preferred email address to your instructor.
     
    3737Before you can perform the tasks described in your exercise assignment, you will, in many cases, need to create an experiment in DeterLab to work on. This will be your environment to use whenever you need it. To create a new experiment:
    3838
    39 1. Log into DETER with your account.
     391. Log into DeterLab with your account.
    40402. Under the "Experimentation" menu at the top of the page, click "Begin an Experiment".
    41413. Select your Class Project name from the "Select Project" dropdown. (Throughout this document, we'll assume your class project name is YourProject)
     
    5959=== How do I access my experiment? ===
    6060
    61 Your experiment is made up of one or more machines on the internal DETER network, which is behind a firewall. To access your experimental nodes, you'll need to first SSH to {{{users.deterlab.net}}}. If you don't know how to use SSH, see our tutorial (TBD).
     61Your experiment is made up of one or more machines on the internal DeterLab network, which is behind a firewall. To access your experimental nodes, you'll need to first SSH to {{{users.deterlab.net}}}. If you don't know how to use SSH, see our tutorial (TBD).
    6262
    63 {{{users.deterlab.net}}} (or {{{users}}} for short) is the "control server" for DETER. From {{{users}}} you can contact all your nodes, reboot them, connect to their serial ports, etc.
     63{{{users.deterlab.net}}} (or {{{users}}} for short) is the "control server" for DeterLab. From {{{users}}} you can contact all your nodes, reboot them, connect to their serial ports, etc.
    6464
    6565Once you log in to {{{users}}}, you'll need to SSH again to your actual experimental nodes. Since your nodes' addresses may change every time you swap them in, it's best to SSH to the permanent network names of the nodes. Here's how to figure out what their names are:
     
    114114* Your preferred email address
    115115* Your student ID (if applicable)
    116 * Your DETER username
     116* Your DeterLab username
    117117* Your experiment's name (e.g., jstudent-exploits)
    118118
     
    121121Please check the following list of questions for answers. If you do not find an answer to your question here or elsewhere, please email your instructor or TA. Do not email testbed ops unless specifically instructed to do so by your instructor.
    122122
    123 === Why can't I log in to DETER? ===
     123=== Why can't I log in to DeterLab? ===
    124124
    125125DeterLab has an automatic blacklist mechanism. '''If you enter the wrong username and password combination too many times, your account will no longer be accessible from your current IP address.''' If you think that this has happened to you, you can try logging in from another address (if you know how), or you can email your instructor or TA and specify your IP address. They will relay the request to the testbed ops that this specific blacklist entry should be erased.