Changes between Version 6 and Version 7 of DETERIntro
- Timestamp:
- Sep 25, 2015 4:54:17 PM (9 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
DETERIntro
v6 v7 9 9 == What is DeterLab? == 10 10 11 [https://www.isi.deterlab.net/ DeterLab] is a security and education-enhanced version of [http://www.emulab.net/ Emulab]. Funded by the [http://www.nsf.gov/ National Science Foundation] and the [http://www.dhs.gov/ Department of Homeland Security], D ETERis hosted by [http://www.isi.edu/ USC/ISI] and [http://www.berkeley.edu/ UC Berkeley].11 [https://www.isi.deterlab.net/ DeterLab] is a security and education-enhanced version of [http://www.emulab.net/ Emulab]. Funded by the [http://www.nsf.gov/ National Science Foundation] and the [http://www.dhs.gov/ Department of Homeland Security], DeterLab is hosted by [http://www.isi.edu/ USC/ISI] and [http://www.berkeley.edu/ UC Berkeley]. 12 12 13 13 "USC/ISI’s DeterLab (cyber DEfense Technology Experimental Research Laboratory) is a state-of-the-art scientific computing facility for cyber-security researchers engaged in research, development, discovery, experimentation, and testing of innovative cyber-security technology. DeterLab is a shared testbed providing a platform for research in cyber security and serving a broad user community, including academia, industry, and government. To date, DeterLab-based projects have included behavior analysis and defensive technologies including DDoS attacks, worm and botnet attacks, encryption, pattern detection, and intrusion-tolerant storage protocols. [ [http://deter-project.org/about_deterlab 1] ]." 14 14 15 D ETER (like Emulab) offers user accounts with assorted permissions associated with different experiment groups. Each group can have its own preconfigured experimental environments running on Linux, BSD, Windows, or other operating systems. Users running DETERexperiments have full control of real hardware and networks running preconfigured software packages. These features make it an ideal platform for computer science and especially computer security education. Many instructors have designed class exercises (homework assignments, project assignments, in-class demos, etc.) consisting of a lab manual, software, data, network configurations, and machines from DETER's pool. This allows each student to run her own experiments on dedicated hardware.15 DeterLab (like Emulab) offers user accounts with assorted permissions associated with different experiment groups. Each group can have its own preconfigured experimental environments running on Linux, BSD, Windows, or other operating systems. Users running DeterLab experiments have full control of real hardware and networks running preconfigured software packages. These features make it an ideal platform for computer science and especially computer security education. Many instructors have designed class exercises (homework assignments, project assignments, in-class demos, etc.) consisting of a lab manual, software, data, network configurations, and machines from DETER's pool. This allows each student to run her own experiments on dedicated hardware. 16 16 17 17 == How does it work? == 18 18 19 The software running D ETER will load operating system images (low level disk copies) onto to free nodes in the testbed, and then reconfigure programmable switches to create VLANs with the newly-imaged nodes connected according to the topology specified by the experiment creator. After the system is fully imaged and configured, DETERwill execute specified scripts, unpack tarballs, and/or install rpm files according to the experiment's configuration. The end result is a live network of real machines, accessible via the Internet.19 The software running DeterLab will load operating system images (low level disk copies) onto to free nodes in the testbed, and then reconfigure programmable switches to create VLANs with the newly-imaged nodes connected according to the topology specified by the experiment creator. After the system is fully imaged and configured, DeterLab will execute specified scripts, unpack tarballs, and/or install rpm files according to the experiment's configuration. The end result is a live network of real machines, accessible via the Internet. 20 20 21 == How do I get a D ETERlogin? ==21 == How do I get a DeterLab login? == 22 22 23 23 1. Your instructor will request an account for you. Simply send your preferred email address to your instructor. … … 37 37 Before you can perform the tasks described in your exercise assignment, you will, in many cases, need to create an experiment in DeterLab to work on. This will be your environment to use whenever you need it. To create a new experiment: 38 38 39 1. Log into D ETERwith your account.39 1. Log into DeterLab with your account. 40 40 2. Under the "Experimentation" menu at the top of the page, click "Begin an Experiment". 41 41 3. Select your Class Project name from the "Select Project" dropdown. (Throughout this document, we'll assume your class project name is YourProject) … … 59 59 === How do I access my experiment? === 60 60 61 Your experiment is made up of one or more machines on the internal D ETERnetwork, which is behind a firewall. To access your experimental nodes, you'll need to first SSH to {{{users.deterlab.net}}}. If you don't know how to use SSH, see our tutorial (TBD).61 Your experiment is made up of one or more machines on the internal DeterLab network, which is behind a firewall. To access your experimental nodes, you'll need to first SSH to {{{users.deterlab.net}}}. If you don't know how to use SSH, see our tutorial (TBD). 62 62 63 {{{users.deterlab.net}}} (or {{{users}}} for short) is the "control server" for D ETER. From {{{users}}} you can contact all your nodes, reboot them, connect to their serial ports, etc.63 {{{users.deterlab.net}}} (or {{{users}}} for short) is the "control server" for DeterLab. From {{{users}}} you can contact all your nodes, reboot them, connect to their serial ports, etc. 64 64 65 65 Once you log in to {{{users}}}, you'll need to SSH again to your actual experimental nodes. Since your nodes' addresses may change every time you swap them in, it's best to SSH to the permanent network names of the nodes. Here's how to figure out what their names are: … … 114 114 * Your preferred email address 115 115 * Your student ID (if applicable) 116 * Your D ETERusername116 * Your DeterLab username 117 117 * Your experiment's name (e.g., jstudent-exploits) 118 118 … … 121 121 Please check the following list of questions for answers. If you do not find an answer to your question here or elsewhere, please email your instructor or TA. Do not email testbed ops unless specifically instructed to do so by your instructor. 122 122 123 === Why can't I log in to D ETER? ===123 === Why can't I log in to DeterLab? === 124 124 125 125 DeterLab has an automatic blacklist mechanism. '''If you enter the wrong username and password combination too many times, your account will no longer be accessible from your current IP address.''' If you think that this has happened to you, you can try logging in from another address (if you know how), or you can email your instructor or TA and specify your IP address. They will relay the request to the testbed ops that this specific blacklist entry should be erased.