Skip to main content

High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11635))

Included in the following conference series:

Abstract

Cyber Range has become an import infrastructure in current cyber security development which is used to systematically improve related abilities such as talent cultivation, cyberwarfare drilling and advanced technology testing. In cyber range, communications and controls between host and guest system is a very important function to monitor and manage the procedures of a task, such as traffic analyzing, guest forensics, configuration transfer and data transfer. QGA is a daemon program running inside the guest system which is designed to support this requirement through a virtual serial device. As the limitations of serial devices, the performance is poor, especially in large file transferring. To overcome this limitation, a new mechanism named HSFT is proposed. It uses virtual NIC which bonded on Linux bridge and provides network connections to communicate with guest system. The experiments results show that HSFT is much faster than QGA in both file reading and writing processes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. NIST. https://www.nist.gov/sites/default/files/documents/2018/02/13/cyber_ranges.pdf. Accessed 03 Mar 2018

  2. Binxing, F., Yan, J., Aiping, L., Weizhe, Z.: Cyber ranges: state-of-the-art and research challenges. J. Cyber Secur. 1(3), 1–9 (2016)

    Google Scholar 

  3. Hu, Y., Jin, H., Yu, Z., et al.: An optimization approach for QEMU. In: 2009 1st International Conference on Information Science and Engineering (ICISE), pp. 129–132. IEEE (2009)

    Google Scholar 

  4. Bushouse, M., Reeves, D.: Hyperagents: migrating host agents to the hypervisor. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, pp. 212–223. ACM (2018)

    Google Scholar 

  5. Holler, A., Krieg, A., Rauter, T., et al.: QEMU-based fault injection for a system-level analysis of software countermeasures against fault attacks. In: 2015 Euromicro Conference on Digital System Design (DSD), pp. 530–533. IEEE (2015)

    Google Scholar 

  6. OpenStack Community. https://www.openstack.org/. Accessed 10 Nov 2018

  7. Corradi, A., Fanelli, M., Foschini, L.: VM consolidation: a real case based on OpenStack cloud. Future Gener. Comput. Syst. 32, 118–127 (2014)

    Google Scholar 

  8. Kim, T., Choi, S., No, J., et al.: HyperCache: a hypervisor-level virtualized I/O cache on KVM/QEMU. In: 2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 846–850. IEEE (2018)

    Google Scholar 

  9. Madjed, B., Mohamed, B.: Flexibility of managing VLAN filtering and segmentation in SDN networks. In: International Symposium on Networks, Computers and Communications (ISNCC) (2017)

    Google Scholar 

  10. Yipeng, W., Tsung-Yuan, C., Ren, W.: Optimizing open vSwitch to support millions of flows. In: GLOBECOM, pp. 1–7 (2017)

    Google Scholar 

  11. Robert, M., Nicole, T.: Space link extension (SLE) emulation for high-throughput network communication. In: 32nd AIAA International Communications Satellite Systems Conference (2014)

    Google Scholar 

  12. Tian, Z., Wang, Y., Sun, Y., Qiu, J.: Location privacy challenges in mobile edge computing: classification and exploration. IEEE Netw. (2019)

    Google Scholar 

  13. Tian, Z., et al.: Real time lateral movement detection based on evidence reasoning network for edge computing environment. IEEE Trans. Ind. Inform. (2019)

    Google Scholar 

  14. Tian, Z., Shen, S., Shi, W., Xiaojiang, D., Guizani, M., Xiang, Yu.: A data-driven model for future internet route decision modeling. Future Gener. Comput. Syst. 95, 212–220 (2019). https://doi.org/10.1016/j.future.2018.12.054

    Article  Google Scholar 

  15. Tian, Z., et al.: A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access. 6, 35355–35364 (2018). https://doi.org/10.1109/access.2018.2846590

    Article  Google Scholar 

  16. Tan, Q., Gao, Y., Shi, J., Wang, X., Fang, B., Tian, Z.H.: Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. (2018). https://doi.org/10.1109/jiot.2018.2846624

    Google Scholar 

  17. Xiao, Y., Rayi, V., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. J. Comput. Commun. 30(11–12), 2314–2341 (2007)

    Google Scholar 

  18. Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. (Elsevier) 5(1), 24–34 (2007)

    Google Scholar 

  19. Xiao, Y., Du, X., Zhang, J., Guizani, S.: Internet protocol television (IPTV): the killer application for the next generation internet. IEEE Commun. Mag. 45(11), 126–134 (2007)

    Google Scholar 

  20. Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. Mag. 15(4), 60–66 (2008)

    Google Scholar 

  21. Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Transactions papers, “a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks”. IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2009)

    Google Scholar 

  22. Hou, M., Wei, R., Wang, T., Cheng, Y., Qian, B.: Reliable medical recommendation based on privacy-preserving collaborative filtering. CMC 56(1), 137–149 (2018)

    Google Scholar 

  23. Zhang, H., Yi, Y., Wang, J., Cao, N., Duan, Q.: Network security situation awareness framework based on threat intelligence. CMC - Comput. Mater. Continua 56(3), 381–399 (2018)

    Google Scholar 

Download references

Acknowledgment

This work is supported by CAEP Foundation (NO. CX2019040), and Defense Industrial Technology Development Program (NO. JCKY2018212C020, JCKY2016212C005).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Le Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xie, J., Zhang, C., Lou, F., Cui, Y., An, L., Wang, L. (2019). High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11635. Springer, Cham. https://doi.org/10.1007/978-3-030-24268-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24268-8_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24267-1

  • Online ISBN: 978-3-030-24268-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics