Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Spamulator: the Internet on a laptop
Aycock J., Crawford H., deGraaf R.  Innovation and technology in computer science education (Proceedings of the 13th Annual Conference on Innovation and Technology in Computer Science Education, Madrid, Spain,142-147.2008.Type:Proceedings
Date Reviewed: Aug 19 2008

Connecting a computer to the Internet is a task for the brave. Phishing, spam, worms, Trojan horses, and a wide variety of threats endanger our computers when we plug in our Ethernet wires or access wireless networks.

Among these threats, spam is one of the worst. On one side, spammers try to deceive us to obtain property or services unjustly by flooding our email accounts with thousands of undesired emails; on the other side, spam filters aim to protect us from this threat. However, spammers progressively refine their fraudulent methods; therefore, improving filters and designing new countermeasures has become a must.

A good strategy to fight against spam is to teach computer scientists and engineers how spammers work. To do so, the authors have designed the Spamulator: a network simulator that aims to help students understand the mysteries of spam. The authors present the Spamulator as a very flexible tool to simulate the Internet on a laptop. The proposed simulator seems to scale properly due to its lightweight design, and the authors assure us that, due to its extensibility, it could be used as a research tool. However, there is no evidence in the paper to support this claim. Unfortunately, I have not been able to test the Spamulator, but, according to the authors, it performs well even on older computers. It appears to be a very interesting teaching tool.

The benefits of the Spamulator for teaching the secrets of spam in a realistic way are evident: scalability, extensibility, and simplicity. However, the usefulness of this simulator for research purposes has not been demonstrated yet. It does appear to be a very promising starting point, though.

Reviewer:  Agusti Solanas Review #: CR135968 (0910-0993)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Computer-Assisted Instruction (CAI) (K.3.1 ... )
 
 
Invasive Software (D.4.6 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Computer And Information Science Education (K.3.2 )
 
 
General (C.2.0 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy