Virtual information security testing system mark II: Epsilon2

Epsilon2 is based off the old Epsilon system but is built from the ground up using newer technologies. It utilizes the KVM hypervisor together with libvirt to virtualize physical networks in order to effectively reduce resource consumption. The simulated networks are used for introducing Information...

Full description

Saved in:
Bibliographic Details
Main Authors: De Luna, Lin G., Detera, Patrick Kevin G., Guerrero, Samuel David F., Mejia, Hiro R.
Format: text
Language:English
Published: Animo Repository 2013
Online Access:https://animorepository.dlsu.edu.ph/etd_bachelors/14839
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: De La Salle University
Language: English
Description
Summary:Epsilon2 is based off the old Epsilon system but is built from the ground up using newer technologies. It utilizes the KVM hypervisor together with libvirt to virtualize physical networks in order to effectively reduce resource consumption. The simulated networks are used for introducing Information Security concepts and practices to students and professionals alike. Improvements include: the simulation of more complex network topologies such as those that use DMZs to enable realistic threat simulations that conform to today’s trends; the centralization of storage and system management which enables an easier and simpler administration, and the deployment of a Web Application to function as the interface where the administrator can perform administrative task such as viewing logs, controlling virtual machines, and defining the network topology. The system has two main components: the e2Server and the e2Client. The e2Server hosts the web server that runs the e2Admin Web Application and also serves as the central repository for all the virtual machines. The e2Client processes the virtual machines for the users sent by the administrator. To verify the functionality of these components, several tests have been conducted. One of these measures the amount of time taken to propagate large file over the network, comparing the transfer time through direct downloads and torrents. Using direct download to propagate a 1 GB file to ten hosts took 16:30, while using torrent technology to send the file only tool on average 2:24. The implementation of torrents decreased the time to send large files over the network. These features along with the system’s performance, shows an improvement over the original Epsilon design.