Resources

Resources

Performing research in cybersecurity requires a robust set of IT resources to support data collection, analysis, experimentation, and development.  Below are essential categories of resources and tools that are equipped in our research group:

(1) Virtualized Environments

Virtualizing-Windows-10-with-Oracle-VirtualBox.png

Virtualized Environments to simulate networks and systems for testing vulnerabilities. Examples: VMware, VirtualBox, or KVM for creating isolated environments.


(2) Security Analysis

download (8).jpg

Security Analysis Tools to analyze vulnerabilities and test security measures. Examples: Kali Linux (a penetration testing platform). Metasploit (exploit development and vulnerability testing). 
Nmap (network discovery and security auditing).


(3) Network Simulation 

download (7).jpg

Network Simulation Tools to model and analyze network behavior under different scenarios. Examples: GNS3 (Graphical Network Simulator). Wireshark (network packet analysis).


(4) Datasets to analyze past attacks, trends, and security breaches.

(5) Research Journals

DeX-and-VMware.png


Research Journals and Resources to stay updated with the latest findings and advancements. Examples: Access to IEEE Xplore, ACM Digital Library, and SpringerLink.