
 
Our current research addresses these issues by 
adding a central authority that connects and manages 
multiple VCSL’s and forwards data between them. 
We showed that traffic inside the DVCSL is 
isolated from the outside world. However, a 
malicious user outside the DVCSL can monitor the 
DVCSL traffic that is sent over the internet. Such a 
malicious user can access the encapsulated OSI-
layer 2 data by using the techniques as described in 
this paper, and distribute the data outside the 
DVCSL. Access to our OSI-layer 2 traffic is 
possible only by intentional installation and 
configuration of additional software components 
which implement a remote bridge endpoint. Typical 
TCP/IP stack configurations do not contain a remote 
bridge endpoint. Despite of this we suggest to 
deploy existing encryption libraries like SSL for 
future implementations of our DVCSL in order to 
make our network traffic completely inaccessible for 
non-DVCSL systems. 
7 CONCLUSIONS 
We presented a DVCSL in which remote students 
can perform network security exercises inside an 
encapsulated common networking environment. The 
DVCSL is built by connecting distinct VCSL’s 
transparently at OSI-layer 2 across an arbitrary 
TCP/IP-based WAN infrastructure like the internet.  
To implement this connection, we designed a 
software component called ghost host with an 
interface to access local virtual network traffic. The 
ghost host can extract and inject Ethernet frames. 
We used the concept of a remote bridge endpoint to 
transport all local OSI-layer 2 traffic between remote 
ghost hosts across a TCP/IP-based WAN. As a proof 
of concept, we demonstrated an example setup 
which shows that both major goals of our effort are 
reached: the remote virtual networks are connected 
transparently at OSI-layer 2 and no intentional or 
unintentional damage can affect systems not 
participating in the DVCSL.  
Summarized our DVCSL will allow remote 
students to attend practical courses in network 
security similar to courses performed in a real 
safeguarded networking laboratory on a technical 
level. As an overall result, this is a considerable step 
towards combining the advantages of distance 
education and on-site training. 
REFERENCES 
Bishop, M. and Heberlein, L. T. (1996). An Isolated 
Network for Research. 19th National Information 
Systems Security Conference, 22-25. 
Border, C. (2007). The development and deployment of a 
multi-user, remote access virtualization system for 
networking, security, and system administration 
classes. ACM SIGCSE Bull., 39(1), 576-580. 
Bullers, W. I., Burd, S. and Seazzu, A. F. (2006). Virtual 
machines - an idea whose time has returned: 
application to network, security, and database courses. 
Proc. SIGCSE Techn. Symp. on Computer Science 
Education, 102-106. 
Comer, D. E. (2001). Computer Networks and Internets, 
with Internet Application (3rd ed.). New York, 
Prentice Hall. 
Damiani, E., Frati, F. and Rebeccani D. (2006). The Open 
Source Virtual Lab: a Case Study. Proc. Workshop on 
Free and Open Source Learning Environments and 
Tools, 5-12. 
Dike, J. (2006). User Mode Linux. New Jersey, Prentice 
Hall. 
Drigas, A. S., Vrettaros, J., Koukianakis, L. G., and 
Glentzes, J. G. (2005). A Virtual Lab and e-learning 
system for renewable energy sources. Proc. WSEAS 
Int. Conf. on Educational Technologies, 149-153. 
Gaspar, A., Langevin, S. and Armitage, W. D. (2007). 
Virtualization technologies in the undergraduate IT 
curriculum. IEEE IT Professional, 9(4), 10-17. 
Hay, B. and Nance, K. L. (2006). Evolution of the 
ASSERT computer security lab. Proc. Coll. for 
Information Systems Security Education, 150-156. 
Hu, J., Cordel, D. and Meinel, C. (2005). Virtual machine 
management for Tele-Lab "IT-Security" server. Proc. 
IEEE Symp. on Computers and Communications. 448-
453. 
Jakab, F., Janitor, J. and Nagy, M. (2009). Virtual Lab in a 
Distributed International Environment – SVC 
EDINET.  Proc. Int. Conf. on Networking and 
Services, 576-580. 
Keller, J. and Naues, R. (2006). Design of a virtual 
computer security lab. Proc. IASTED Int. Conf. on 
Communication, Network, and Information Security, 
211-215. 
Krishna, K., Sun, W., Rana, P., Li, T. and Sekar, R. 
(2005). V-NetLab: a cost-effective platform to support 
course projects in computer security. Proc. Annual 
Coll. for Information Systems Security Education, 1-7. 
Lahoud, H. A. and Tang, X. (2006). Information security 
labs in IDS/IPS for distance education. Proc. Conf. on 
Information Technology Education, 47-52. 
Li, P. (2009). Exploring virtual environments in a 
decentralized lab. ACM SIGITE Research in IT, 6(1), 
4-10. 
Mattord, H. J. and Whitman, M. E. (2004). Planning, 
building and operating the information security and 
assurance laboratory. Proc. Annual Conf. on 
Information Security Curriculum Development, 8-14. 
O'Leary, M. (2006). A laboratory based capstone course in 
computer security for undergraduates. 
Proc. SIGCSE 
Techn. Symp. on Computer Science Education, 2-6. 
CSEDU 2011 - 3rd International Conference on Computer Supported Education
118