Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies (2307.04416v1)
Abstract: Cyber ranges mimic real-world cyber environments and are in high demand. Before building their own cyber ranges, organizations need to deeply understand what construction supplies are available to them. A fundamental supply is the cyber range architecture, which prompts an important research question: Which cyber range architecture is most appropriate for an organization's requirements? To answer this question, we propose an innovative framework to specify cyber range requirements, characterize cyber range architectures (based on our analysis of 45 cyber range architectures), and match cyber range architectures to cyber range requirements.
- J. Vykopal, P. Čeleda, P. Seda, V. Švábenskỳ, and D. Tovarňák, “Scalable learning environments for teaching cybersecurity hands-on,” in 2021 IEEE Frontiers in Education Conference (FIE), pp. 1–9, IEEE, 2021.
 - R. Beuran, D. Tang, C. Pham, K.-i. Chinen, Y. Tan, and Y. Shinoda, “Integrated framework for hands-on cybersecurity training: Cytrone,” Computers & Security, vol. 78, pp. 43–59, 2018.
 - PhD thesis, 2022.
 - T. Debatty and W. Mees, “Building a cyber range for training cyberdefense situation awareness,” in 2019 ICMCIS, pp. 1–6, IEEE, 2019.
 - G. Potamos, A. Peratikou, and S. Stavrou, “Towards a maritime cyber range training environment,” in 2021 IEEE CSR, pp. 180–185, 2021.
 - S. Ahmad et al., “Design and implementation of a network of specialized and hybrid cyber-ranges,” 2021.
 - S. J. Coshatt, Q. Li, B. Yang, S. Wu, D. Shrivastava, J. Ye, W. Song, and F. Zahiri, “Design of cyber-physical security testbed for multi-stage manufacturing system,” in IEEE GLOBECOM, pp. 1978–1983, 2022.
 - A. Ronkainen, F. Teye, M. Koistinen, J. Kaivosoja, L. Pesonen, and P. Suomi, “Mtt cropinfra,” in Testbeds and Research Infrastructure. Development of Networks and Communities: ICST, Springer, 2012.
 - C. Virág, J. Čegan, T. Lieskovan, and M. Merialdo, “The current state of the art and future of european cyber range ecosystem,” in IEEE CSR, pp. 390–395, IEEE, 2021.
 - T. Lieskovan and J. Hajnỳ, “Building open source cyber range to teach cyber security,” in ARES, pp. 1–11, 2021.
 - M. Smeets, “The role of military cyber exercises: A case study of locked shields,” in CyCon, vol. 700, pp. 9–25, IEEE, 2022.
 - Z. Tian, Y. Cui, L. An, S. Su, X. Yin, L. Yin, and X. Cui, “A real-time correlation of host-level events in cyber range service for smart campus,” IEEE Access, vol. 6, pp. 35355–35364, 2018.
 - M. Luglio, C. Roseti, and F. Zampgnaro, “A satellite network emulation platform for implementation and testing of tcp/ip applications,” in Testbeds and Research Infrastructure. Development of Networks and Communities: ICST, pp. 1–2, Springer, 2012.
 - K. A. Batterton and K. N. Hale, “The likert scale what it is and how to use it,” Phalanx, vol. 50, no. 2, pp. 32–39, 2017.
 - M. M. Yamin, B. Katt, and V. Gkioulos, “Cyber ranges and security testbeds: Scenarios, functions, tools and architecture,” Computers & Security, vol. 88, 2020.
 - E. Ukwandu, M. A. B. Farah, H. Hindy, D. Brosset, D. Kavallieros, R. Atkinson, C. Tachtatzis, M. Bures, I. Andonovic, and X. Bellekens, “A review of cyber-ranges and test-beds: Current and future trends,” Sensors, vol. 20, no. 24, p. 7148, 2020.
 - N. Chouliaras, G. Kittes, I. Kantzavelou, L. Maglaras, G. Pantziou, and M. A. Ferrag, “Cyber ranges and testbeds for education, training, and research,” Applied Sciences, vol. 11, no. 4, p. 1809, 2021.
 - J. Davis and S. Magrath, “A survey of cyber ranges and testbeds,” 2013.
 - S. Kucek and M. Leitner, “An empirical survey of functions and configurations of open-source capture the flag (ctf) environments,” Journal of Network and Computer Applications, vol. 151, p. 102470, 2020.
 - V. Orbinato, “A next-generation platform for cyber range-as-a-service,” in IEEE ISSREW, pp. 314–318, IEEE, 2021.
 - M. Macak, R. Oslejsek, and B. Buhnova, “Applying process discovery to cybersecurity training: An experience report,” in 2022 IEEE EuroS&PW, pp. 394–402, IEEE, 2022.
 - I. Priyadarshini, Features and architecture of the modern cyber range: a qualitative analysis and survey. University of Delaware, 2018.
 - R. Beuran, J. Vykopal, D. Belajová, P. Čeleda, Y. Tan, and Y. Shinoda, “Capability assessment methodology and comparative analysis of cybersecurity training platforms,” Computers & Security, p. 103120, 2023.
 - R. Beuran, Z. Zhang, and Y. Tan, “Aws ec2 public cloud cyber range deployment,” in IEEE EuroS&PW, pp. 433–441, IEEE, 2022.
 - A. P. Luise, G. Perrone, C. Perrotta, and S. P. Romano, “On-demand deployment and orchestration of cyber ranges in the cloud.,” in ITASEC, pp. 80–91, 2021.
 - H. Farhat, “Design and development of the back-end software architecture for a hybrid cyber range,” 2021.
 - M. Pendleton, R. Garcia-Lebron, J.-H. Cho, and S. Xu, “A survey on systems security metrics,” ACM Comput. Surv., vol. 49, pp. 62:1–62:35, Dec. 2016.
 - J.-H. Cho, S. Xu, P. M. Hurley, M. Mackay, T. Benjamin, and M. Beaumont, “Stram: Measuring the trustworthiness of computer-based systems,” ACM Comput. Surv., vol. 51, no. 6, pp. 128:1–128:47, 2019.
 - S. Xu, “Sarr: A cybersecurity metrics and quantification framework (keynote),” in Science of Cyber Security - Third International Conference (SciSec’2021), vol. 13005 of LNCS, pp. 3–17, 2021.
 - D. Li, Q. Li, Y. F. Ye, and S. Xu, “Arms race in adversarial malware detection: A survey,” ACM Comput. Surv., vol. 55, no. 1, 2023.
 - S. Xu, “The cybersecurity dynamics way of thinking and landscape (invited paper),” in ACM Workshop on Moving Target Defense, 2020.
 - H. Chen, H. Cam, and S. Xu, “Quantifying cybersecurity effectiveness of dynamic network diversity,” IEEE Transactions on Dependable and Secure Computing, 2021.
 
Paper Prompts
Sign up for free to create and run prompts on this paper using GPT-5.
Top Community Prompts
Collections
Sign up for free to add this paper to one or more collections.