Cyber Ranges and TestBeds for Education, Training, and Research
Abstract
:1. Introduction
- It presents the current state of the art on testbeds and cyber ranges.
- It presents the findings of a set of structured interviews with organizations that have a testbed and cyber range.
- It discusses the findings and gives insights of modern cyber ranges.
2. Related Surveys
- Focus area: We categorize surveys in relation to their scope.
- Method: this category indicates the method of collection and analysis of the data that are related to the CRs.
3. Background
- Research (testing implementations including methods, tools, building blocks and systems)
- Training/Education (academia, specialized security courses and cyber-security certifications)
- Exercises/Competitions on Cyber Security (security training by means of cyber security exercises like Capture the Flag or Cyber Defense Exercises).
4. Analysis of Results
5. Challenges and Future Directions
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Conflicts of Interest
Appendix A. Questionnaire
- What is the objective of the Cyber Range? (select all that apply)
- What is the supporting sector of the Cyber Range? (select all that apply)
- What is the domain that is emulated or replicated in the operational environment? (select all that apply)
- What type of security challenges are provided? (select all that apply)
- Is the Cyber Range used for educational purposes?
- What is the type of Cyber Range environment?
- Which infrastructure platform(s) is (are) used to develop the Cyber Range?
- What type of access does it provide to participants? (select all that apply)
- What tools are used to
- i.
- Set up Vms?
- ii.
- Set up network topology?
- iii.
- Keep scoring? (flag dashboards, log analyzers, etc.)
- iv.
- Create cyber security scenarios?
- v.
- Manage the Cyber Range? (resources)
- vi.
- Monitoring the exercises ? (SIEM, IDS, etc.)
- vii.
- Generate network traffic?
- viii.
- Generate user behaviour?
- ix.
- Other functions?
- Teams, Roles and Participants
- i.
- How many teams can participate at the same time?
- ii.
- Total number of active participants?
- iii.
- PARTICIPANTS: What are the roles/functions? (select all that apply) iv. Roles
- Has the Cyber Range been used already?
- Has the Cyber Range provided any dataset?
- i.
- if yes the dataset is?
- ii.
- What type of information does the dataset contain?
References
- Maglaras, L.A.; Kim, K.H.; Janicke, H.; Ferrag, M.A.; Rallis, S.; Fragkou, P.; Maglaras, A.; Cruz, T.J. Cyber security of critical infrastructures. ICT Express 2018, 4, 42–45. [Google Scholar] [CrossRef]
- Ferrag, M.A. EPEC: An efficient privacy-preserving energy consumption scheme for smart grid communications. Telecommun. Syst. 2017, 66, 671–688. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Nafa, M.; Ghanemi, S. EPSA: An efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks. Int. J. Secur. Netw. 2016, 11, 107–125. [Google Scholar] [CrossRef]
- Braghin, C.; Cimato, S.; Damiani, E.; Frati, F.; Mauri, L.; Riccobene, E. A Model Driven Approach for Cyber Security Scenarios Deployment. In Computer Security; Fournaris, A.P., Athanatos, M., Lampropoulos, K., Ioannidis, S., Hatzivasilis, G., Damiani, E., Abie, H., Ranise, S., Verderame, L., Siena, A., et al., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 107–122. [Google Scholar]
- Chung, M. Signs your cyber security is doomed to fail. Comput. Fraud. Secur. 2020, 2020, 10–13. [Google Scholar] [CrossRef]
- Crumpler, W.; Lewis, J.A. Cybersecurity Workforce Gap; Center for Strategic and International Studies (CSIS): Washington, DC, USA, 2019. [Google Scholar]
- Angafor, G.N.; Yevseyeva, I.; He, Y. Bridging the Cyber Security Skills Gap: Using Tabletop Exercises to Solve the CSSG Crisis. In Proceedings of the IFIP Joint International Conference on Serious Games, Stoke-on-Trent, UK, 19–20 November 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 117–131. [Google Scholar]
- Gartner, I. Forecast Analysis: Container Management (Software and Services); Gartner, Inc.: Stamford, CT, USA, 2020. [Google Scholar]
- Stewart, B.; Rosa, L.; Maglaras, L.A.; Cruz, T.J.; Ferrag, M.A.; Simoes, P.; Janicke, H. A novel intrusion detection mechanism for scada systems which automatically adapts to network topology changes. EAI Endorsed Trans. Ind. Networks Intell. Syst. 2017, 4. [Google Scholar] [CrossRef] [Green Version]
- Hallaq, B.; Nicholson, A.; Smith, R.; Maglaras, L.; Janicke, H.; Jones, K. CYRAN: A hybrid cyber range for testing security on ICS/SCADA systems. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications; IGI Global: Hershey, PA, USA, 2018; pp. 622–637. [Google Scholar]
- Chandra, Y.; Mishra, P.K. Design of Cyber Warfare Testbed. In Software Engineering; Hoda, M.N., Chauhan, N., Quadri, S.M.K., Srivastava, P.R., Eds.; Springer: Singapore, 2019; pp. 249–256. [Google Scholar]
- Updyke, D.; Dobson, G.; Podnar, T.; Osterritter, L.; Earl, B.; Cerini, A. GHOSTS in the Machine: A Framework for Cyber-Warfare Exercise NPC Simulation; Technical Report CMU/SEI-2018-TR-005; Software Engineering Institute, Carnegie Mellon University: Pittsburgh, PA, USA, 2018. [Google Scholar]
- UNIWA. UNIWA CTF. Available online: http://www.pdsn.uniwa.gr/profile/inssec/ (accessed on 17 January 2021).
- Davis, J.; Magrath, S. A Survey of Cyber Ranges and Testbeds Executive; Cyber Electronic Warfare Division DSTO (Defence Science and Technology Organisation): Edinburgh, Australia, 2013. [Google Scholar]
- Holm, H.; Karresand, M.; Vidström, A.; Westring, E. A Survey of Industrial Control System Testbeds. In Secure IT Systems; Buchegger, S., Dam, M., Eds.; Springer International Publishing: Cham, Switzerland, 2015; pp. 11–26. [Google Scholar]
- Yamin, M.M.; Katt, B.; Gkioulos, V. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 2020, 88, 101636. [Google Scholar] [CrossRef]
- Kucek, S.; Leitner, M. An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments. J. Netw. Comput. Appl. 2020, 151, 102470. [Google Scholar] [CrossRef]
- Ukwandu, E.; Farah, M.A.B.; Hindy, H.; Brosset, D.; Kavallieros, D.; Atkinson, R.; Tachtatzis, C.; Bures, M.; Andonovic, I.; Bellekens, X. A review of cyber-ranges and test-beds: Current and future trends. Sensors 2020, 20, 7148. [Google Scholar] [CrossRef] [PubMed]
- Dark, M. Thinking about Cybersecurity. IEEE Secur. Priv. 2015, 13, 61–65. [Google Scholar] [CrossRef]
- NIST. Cyber Ranges; NIST: Gaithersburg, MD, USA.
- Braghin, C.; Cimato, S.; Damiani, E.; Frati, F.; Riccobene, E.; Astaneh, S. Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges. In International Workshop on Model-Driven Simulation and Training Environments for Cybersecurity; Springer: Berlin/Heidelberg, Germany, 2020; pp. 79–91. [Google Scholar]
- Eichler, Z. Cloud-Based Security Research Testbed: A DDoS Use Case. In Proceedings of the 2014 IEEE Network Operations and Management Symposium (NOMS), Krakow, Poland, 5–9 May 2014. [Google Scholar]
- Goldman, R. Learning Proxmox VE; Packt Publishing Ltd.: Birmingham, UK, 2016. [Google Scholar]
- Østby, G.; Berg, L.; Kianpour, M.; Katt, B.; Kowalski, S.J. A Socio-Technical Framework to Improve cyber security training: A Work in Progress. In Proceedings of the fifth Workshop on Socio-Technical Perspective in IS development, Stockholm, Sweden, 10 June 2019; pp. 81–96. [Google Scholar]
- Raybourn, E.M.; Kunz, M.; Fritz, D.; Urias, V. A Zero-Entry Cyber Range Environment for Future Learning Ecosystems. In Cyber-Physical Systems Security; Springer: Berlin/Heidelberg, Germany, 2018; pp. 93–109. [Google Scholar]
- Pham, C.; Tang, D.; Chinen, K.I.; Beuran, R. Cyris: A cyber range instantiation system for facilitating security training. In Proceedings of the Seventh Symposium on Information and Communication Technology, Ho Chi Minh, Vietnam, 8–9 December 2016; pp. 251–258. [Google Scholar]
- Luchian, E.; Filip, C.; Rus, A.B.; Ivanciu, I.; Dobrota, V. Automation of the infrastructure and services for an openstack deployment using chef tool. In Proceedings of the 2016 15th RoEduNet Conference: Networking in Education and Research, Bucharest, Romania, 7–9 September 2016; pp. 1–5. [Google Scholar]
- Kostromin, R. Survey of Software Configuration Management Tools of Nodes in Heterogeneous Distributed Computing Environment. Available online: http://ceur-ws.org/Vol-2638/paper15.pdf (accessed on 17 January 2021).
- Tkachuk, R.V.; Ilie, D.; Tutschku, K. Orchestrating Future Service Chains in the Next, Generation of Clouds. In Proceedings of the 15th SNCNW 2019, Lulea, Sweden, 4–5 June 2019; pp. 18–22. [Google Scholar]
- Brikman, Y. Why We Use Terraform and not Chef, Puppet, Ansible, Saltstack, or Cloudformation. 2016. Available online: https://lsi.vc.ehu.eus/pablogn/docencia/AS/Act7%20Admin.%20centralizada%20infrastructure-as-code,%20Configuration%20Management/Terraform%20Chef%20Puppet%20Ansible%20Salt.pdf (accessed on 17 January 2021).
- Pernik, P. Improving Cyber Security: NATO and the EU; International Center for Defence Studies: Tallinn, Estonia, 2014. [Google Scholar]
- Vykopal, J.; Ošlejšek, R.; Čeleda, P.; Vizvary, M.; Tovarňák, D. Kypo Cyber Range: Design and Use Cases. 2017. Available online: https://is.muni.cz/publication/1386573/en/KYPO-Cyber-Range-Design-and-Use-Cases/Vykopal-Oslejsek-Celeda-Vizvary (accessed on 17 January 2021).
- Vykopal, J.; Vizvary, M.; Oslejsek, R.; Celeda, P.; Tovarnak, D. Lessons learned from complex hands-on defence exercises in a cyber range. In Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE), Indianapolis, IN, USA, 18–21 October 2017; pp. 1–8. [Google Scholar]
- Range, F.C. Florida Cyber Range. Available online: https://floridacyberrange.org/ (accessed on 24 November 2020).
- Range, V.C. About the Virginia Cyber Range. Available online: https://www.virginiacyberrange.org/ (accessed on 25 November 2020).
- Darwish, O.; Stone, C.M.; Karajeh, O.; Alsinglawi, B. Survey of Educational Cyber Ranges. In Proceedings of the Workshops of the International Conference on Advanced Information Networking and Applications, Caserta, Italy, 15–17 April 2020; Springer: Berlin/Heidelberg, Germany, 2020; pp. 1037–1045. [Google Scholar]
- Debatty, T.; Mees, W. Building a Cyber Range for training CyberDefense Situation Awareness. In Proceedings of the 2019 International Conference on Military Communications and Information Systems (ICMCIS), Budva, Montenegro, 14–15 May 2019; pp. 1–6. [Google Scholar] [CrossRef]
- Llopis, S.; Hingant, J.; Pérez, I.; Esteve, M.; Carvajal, F.; Mees, W.; Debatty, T. A comparative analysis of visualisation techniques to achieve cyber situational awareness in the military. In Proceedings of the 2018 International Conference on Military Communications and Information Systems (ICMCIS), Warsaw, Poland, 22–23 May 2018; pp. 1–7. [Google Scholar] [CrossRef]
- Leitner, M.; Frank, M.; Hotwagner, W.; Langner, G.; Maurhart, O.; Pahi, T.; Reuter, L.; Skopik, F.; Smith, P.; Warum, M. AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. In Proceedings of the European Interdisciplinary Cybersecurity Conference (EICC), Rennes, France, 18 November 2020; pp. 18–19. [Google Scholar]
- Frank, M.; Leitner, M.; Pahi, T. Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. In Proceedings of the 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, USA, 6–10 November 2017; pp. 38–46. [Google Scholar] [CrossRef]
- Kucek, S.; Leitner, M. Training the Human-in-the-Loop in Industrial Cyber Ranges. In Digital Transformation in Semiconductor Manufacturing; Keil, S., Lasch, R., Lindner, F., Lohmer, J., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 107–118. [Google Scholar]
- Irvine, C.E.; Thompson, M.F.; McCarrin, M.; Khosalim, J. Live Lesson: Labtainers: A Docker-based Framework for Cybersecurity Labs. In Proceedings of the 2017 USENIX Workshop on Advances in Security Education (ASE 17), Vancouver, BC, Canada, 5 August 2017; USENIX Association: Vancouver, BC, Canada, 2017. [Google Scholar]
- Thompson, M.F.; Irvine, C.E. Individualizing Cybersecurity Lab Exercises with Labtainers. IEEE Secur. Priv. 2018, 16, 91–95. [Google Scholar] [CrossRef]
- Kianpour, M.; Kowalski, S.; Zoto, E.; Frantz, C.; Øverby, H. Designing Serious Games for Cyber Ranges: A Socio-technical Approach. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Stockholm, Sweden, 17–19 June 2019; pp. 85–93. [Google Scholar] [CrossRef] [Green Version]
- Kokkonen, T.; Hämäläinen, T.; Silokunnas, M.; Siltanen, J.; Zolotukhin, M.; Neijonen, M. Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise. In Internet of Things, Smart Spaces, and Next, Generation Networks and Systems; Balandin, S., Andreev, S., Koucheryavy, Y., Eds.; Springer International Publishing: Cham, Switzerland, 2015; pp. 254–267. [Google Scholar]
- Karjalainen, M.; Kokkonen, T.; Puuska, S. Pedagogical Aspects of Cyber Security Exercises. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Stockholm, Sweden, 17–19 June 2019; pp. 103–108. [Google Scholar] [CrossRef] [Green Version]
- Gustafsson, T.; Almroth, J. Cyber Range Automation Overview with a Case Study of CRATE. Available online: https://www.researchgate.net/profile/Tommy_Gustafsson2/publication/346559585_Cyber_range_automation_overview_with_a_case_study_of_CRATE/links/5fc73339299bf188d4e8f40b/Cyber-range-automation-overview-with-a-case-study-of-CRATE.pdf (accessed on 17 January 2021).
- Holm, H.; Sommestad, T. SVED: Scanning, Vulnerabilities, Exploits and Detection. In Proceedings of the MILCOM 2016—2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1–3 November 2016; pp. 976–981. [Google Scholar] [CrossRef]
- Rege, A.; Adams, J.; Parker, E.; Singer, B.; Masceri, N.; Pandit, R. Using cybersecurity exercises to study adversarial intrusion chains, decision-making, and group dynamics. In Proceedings of the European Conference on Cyber Warfare and Security, Dublin, Ireland, 29–30 June 2017; Academic Conferences International Limited: Cambridge, MA, USA, 2017; pp. 351–360. [Google Scholar]
- Silensec. Silensec. Available online: https://www.silensec.com/about-us/cyberranges (accessed on 24 November 2020).
- Hara, K. Cyber Range CYBERIUM for Training Security Meisters to Deal with Cyber Attacks. Fujitsu Sci. Tech. J. 2019, 55, 59–63. [Google Scholar]
- Nuari. Nuari. Available online: https://nuari.net/ (accessed on 24 November 2020).
- Center, G.C. Georgia Cyber Center. Available online: https://www.gacybercenter.org/ (accessed on 24 November 2020).
- IBM. IBM Xforce. Available online: https://exchange.xforce.ibmcloud.com/ (accessed on 25 November 2020).
- Cybexer. Cybexer. Available online: https://cybexer.com/ (accessed on 25 November 2020).
- Airbus. Airbus Cyber Range. Available online: https://airbus-cyber-security.com/products-and-services/prevent/cyberrange/ (accessed on 25 November 2020).
- Raytheon. Raytheon Cyber Range. Available online: https://www.raytheon.com/cyber/capabilities/range (accessed on 25 November 2020).
- DIATEAM. Hns-Platform Cyber Range. Available online: https://www.hns-platform.com/ (accessed on 25 November 2020).
- Cyberbit. Cyberbit Cyber Range. Available online: https://www.cyberbit.com/platform/cyber-range/ (accessed on 25 November 2020).
- Range, C.W. Cyber Warfare Range. Available online: https://www.azcwr.org/ (accessed on 25 November 2020).
- Chouliaras, N. Cyber Range Questionnaire. Available online: https://docs.google.com/forms/d/e/1FAIpQLSek34D2Ks4laS4AmajwHZAGqWGOrQxCOGIM3Lcmyaof2xyd2w/viewform?usp=sf_link (accessed on 15 September 2020).
- Seker, E.; Ozbenli, H.H. The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation. In Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK, 3–4 June 2018; pp. 1–9. [Google Scholar]
- Forero, C.A.M. Tabletop Exercise For Cybersecurity Educational Training; Theoretical Grounding in addition, Development. Master’s Thesis, University of Tartu Institute of Computer Science, Tartu, Estonia, 2016. [Google Scholar]
- Kick, J. Cyber Exercise Playbook; Technical Report; MITRE CORP: Bedford, MA, USA, 2014. [Google Scholar]
- Beveridge, R. Effectiveness of Increasing Realism Into Cybersecurity Training. Int. J. Cyber Res. Educ. (IJCRE) 2020, 2, 40–54. [Google Scholar] [CrossRef]
- Technology, J.J.S. RGCE Organizational Environments. Available online: https://jyvsectec.fi/2018/01/rgce-organizational-environments/ (accessed on 25 November 2020).
- Teknisk-Naturvitenskapelige Universitet, N. Om Norwegian Cyber Range. Available online: https://www.ntnu.no/ncr (accessed on 25 November 2020).
- University, M. KYPO Cyber Range Platform. Available online: https://crp.kypo.muni.cz/ (accessed on 25 November 2020).
- Nussbaum, L. Testbeds Support for Reproducible Research. In Proceedings of the Reproducibility Workshop; 2017; pp. 24–26. [Google Scholar]
- Braje, T.M. Advanced Tools for Cyber Ranges; Technical Report; MIT Lincoln Laboratory: Lexington, KY, USA, 2016. [Google Scholar]
- (ECSO), E.C.S.O. Understanding Cyber Ranges: From Hype to Reality. Available online: https://ecs-org.eu/documents/publications/5fdb291cdf5e7.pdf (accessed on 25 November 2020).
- Russo, E.; Costa, G.; Armando, A. Building Next, Generation Cyber Ranges with CRACK. Comput. Secur. 2020, 95, 101837. [Google Scholar] [CrossRef]
- Behal, S.; Kumar, K. Characterization and Comparison of DDoS Attack Tools and Traffic Generators: A Review. IJ Netw. Secur. 2017, 19, 383–393. [Google Scholar]
- Patil, B.R.; Moharir, M.; Mohanty, P.K.; Shobha, G.; Sajeev, S. Ostinato—A Powerful Traffic Generator. In Proceedings of the 2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), Bangalore, India, 21–23 December 2017; pp. 1–5. [Google Scholar]
- Botta, A.; Dainotti, A.; Pescapè, A. A tool for the generation of realistic network workload for emerging networking scenarios. Comput. Netw. 2012, 56, 3531–3547. [Google Scholar] [CrossRef]
- Erlacher, F.; Dressler, F. How to Test an IDS? GENESIDS: An Automated System for Generating Attack Traffic. In Proceedings of the 2018 Workshop on Traffic Measurements for Cybersecurity, Budapest, Hungary, 20–24 August 2018; pp. 46–51. [Google Scholar]
- Berk, V.H.; de Souza, I.G.; Murphy, J.P. Generating realistic environments for cyber operations development, testing, and training. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense XI; Carapezza, E.M., Ed.; International Society for Optics and Photonics, SPIE: Bellingham, WA, USA, 2012; Volume 8359, pp. 51–59. [Google Scholar] [CrossRef]
- Applebaum, A.; Miller, D.; Strom, B.; Korban, C.; Wolf, R. Intelligent, automated red team emulation. In Proceedings of the 32nd Annual Conference on Computer Security Applications, Los Angeles, CA, USA, 5–9 December 2016; pp. 363–373. [Google Scholar]
- Kokkonen, T.; Puuska, S. Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises. In Internet of Things, Smart Spaces, and Next, Generation Networks and Systems; Springer: Berlin/Heidelberg, Germany, 2018; pp. 277–288. [Google Scholar]
- NCCDC. National CCDC. Collegiate Cyber Defense Competition. Available online: https://www.nationalccdc.org/ (accessed on 25 September 2020).
- Evans, M.; He, Y.; Maglaras, L.; Janicke, H. HEART-IS: A novel technique for evaluating human error-related information security incidents. Comput. Secur. 2019, 80, 74–89. [Google Scholar] [CrossRef]
- Kosmanos, D.; Prodromou, N.; Argyriou, A.; Maglaras, L.A.; Janicke, H. MIMO techniques for jamming threat suppression in vehicular networks. Mob. Inf. Syst. 2016, 2016, 8141204. [Google Scholar] [CrossRef] [Green Version]
- Ferrag, M.A.; Maglaras, L.; Ahmim, A.; Derdour, M.; Janicke, H. Rdtids: Rules and decision tree-based intrusion detection system for internet-of-things networks. Future Internet 2020, 12, 44. [Google Scholar] [CrossRef] [Green Version]
- Doubleday, H.; Maglaras, L.; Janicke, H. SSH Honeypot: Building, Deploying and Analysis. 2016. Available online: https://dora.dmu.ac.uk/handle/2086/12079 (accessed on 17 January 2021).
- Papaspirou, V.; Maglaras, L.; Ferrag, M.A.; Kantzavelou, I.; Janicke, H.; Douligeris, C. A novel Two-Factor HoneyToken Authentication Mechanism. arXiv 2020, arXiv:2012.08782. [Google Scholar]
Survey | Reference | Systems Studied | Focus Area | Year | Method |
---|---|---|---|---|---|
Davis-Magrath et al. | [14] | 30 | Broad | 2013 | Literature Review |
Holm et al. | [15] | 30 | ICS | 2015 | Literature Review |
Yamin et al. | [16] | 100 | Broad | 2019 | Literature Review |
Kucek et al. | [17] | 28 | CTFs | 2020 | Empirical Review |
Ukwandu et al. | [18] | 44 | Broad | 2020 | Literature Review |
Chouliaras et al. | Our survey | 25 | Broad | 2021 | Literature Review Structured Interviews |
Operator | Objective | Sector | Environment | Infrastructure Platform(s) | Dataset |
---|---|---|---|---|---|
NATO Cyber Range [31] | T, E | M | EM | VW | N/A |
Masaryk University (KYPO) [32,33] | R, T, E, ED | A | EM | O | Y |
Florida Cyber Range [34] | ED, R, T, O | M | N/A | N/A | N/A |
Sandia National Laboratories (Cyber Scorpion) [25] | T | G | N/A | MN | N/A |
Virginia Tech [35,36] | R, T, E | A | S | AW | N/A |
De Montfort University [10] | R, T, E | A | HCP | Q | OD |
Royal Military Academy [37,38] | R, T | A, M | S | VB, C | N |
AIT Austrian Institute of Technology [39,40,41] | R, T, E | A, G, M, PE | HCP | O, TR | N |
Naval Postgraduate School [42,43] | T, E, ED | A, G, M | S | D | IN |
Norwegian University of Science and Technology (NCR) [44] | R, T, E, Ts | A, G, M, PE | EM, S, HCP | O, VB, VM, D | OD |
Università degli Studi di Milano [21] | T | R | EM, S | O | No |
JAMK University of Applied Sciences (JYVSECTEC) [45,46] | R, T, E | A, G, M, PE | EM, S, HCP | N/A | IH |
Swedish Defence Research Agency (CRATE) [47,48] | R, T, E | G, M | HCP | VB | ON |
Michigan Cyber Range [49] | T | A | N/A | N/A | Yes |
Silensec [50] | T | I | N/A | N/A | ON |
CYBERIUM (fujitsu) [51] | T | I | N/A | N/A | ON |
DECIDE (NUARI) [52] | R, T, E | A | N/A | N/A | ON |
Georgia Cyber Range [53] | ED, T, R, DM, DV | A | N/A | N/A | ON |
IBM X-Force Command C-TOC [54] | T, E | I | N/A | N/A | ON |
Cybexer [55] | T, E | I | N/A | N/A | ON |
Airbus Cyber Range [56] | R, T, E | I | S | N/A | ON |
Raytheon Cyber Range [57] | T, E | M, A, I | N/A | N/A | ON |
hns-platform [58] | T, E | I | HCP, S | N/A | ON |
Cyberbit Cyber Range [59] | T, E | I | S | N/A | ON, OP |
Cyber Warfare Range [60] | T, E | I | S | N/A | OS, OP |
Operator | Security Challenges | Courses | Access | Roles | Teams | Events |
---|---|---|---|---|---|---|
De Montfort University | W, E, AP | DF, SS, IC | OP | SC, NC, CR | B, RD, G, YL, WT, P | EV, WS, EX |
Royal Military Academy | W, F, DD, AP | DF, NS, WS | RA | N/A | B | EX |
Masaryk University | W, F, E, SI, MA | DF, NS | OP, RA | CR, CS | B, RD, G, YL, WT, P | EV, WS, EX |
AIT Austrian Institute of Technology | W, F, E, DD, AP, R, MA | NS, WS, OS | OP, RA | SC, CR, CS, CO, IT, LG | B, RD, G, YL, WT, P | EV, WS, EX |
Naval Postgraduate School | W, C, E, DD, SI, MA, RE | C, SS, NS, WS | L | Various | N/A | EI |
Norwegian University of Science and Technology | W, C, F, E, S, DD, AP, R, SI, MA, RE, RM, ISE, CM, CP | C, DF, HS, SS, NS, CS, WS, CM | OP, RA | SC, NC, CR, CS, M, CV | B, RD, WT P | EV, WS, EX |
Virginia Tech | W, C, F, E, S, SI, RE | C, DF, SS, NS, WS | RA | N/A | N/A | EV, WS, EX, EI |
Università degli Studi di Milano | W, F, SI, MA, RB | DF, WS | OP, RA | N/A | B, RD, G | N/A |
JAMK University of Applied Sciences | W, C, F, E, S, DD, AP, R, SI, MA, RE | DF, HS, SS, NS, CS, WS | OP, RA | SC, NC, CR, CS | B, RD, G, YL, WT, P | EV, WS, EX |
Swedish Defence Research Agency | W, F, DD, R, MA | SS, NS | OP, RA | SC, NC, CR | B, RD, G, WT | EV, WS, EX |
Operator | VM | Network | Scoring | Scenarios | Manage | Monitor | Traffic | User Behavior |
---|---|---|---|---|---|---|---|---|
De Montfort University | MS | PR | Y | MF | PR | OS, SN, SU, N, W, M | D, B | B |
Royal Military Academy | A | VB | N/A | J | C | SN, N | N/A | G |
Masaryk University | A | O | C | JS, YM, C | C | NG | N/A | C |
AIT Austrian Institute of Technology | A | O | N/A | JS | N/A | OS, W | N/A | C |
Naval Postgraduate School | DC | LDT | AG | LDT | N/A | A | N/A | N/A |
Norwegian University of Science and Technology | A, V, MS | O | J | YM | XT | OS | OF, D | GS |
Virginia Tech | P | CL | CC | N/A | AP | CW | N/A | N/A |
Università degli Studi di Milano | OH | O | IT | X | IT | Y | IT | N/A |
JAMK University of Applied Sciences | N/A | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Swedish Defence Research Agency | S | VB, VX | N/A | N/A | N/A | N/A | N/A | AI, BT |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Chouliaras, N.; Kittes, G.; Kantzavelou, I.; Maglaras, L.; Pantziou, G.; Ferrag, M.A. Cyber Ranges and TestBeds for Education, Training, and Research. Appl. Sci. 2021, 11, 1809. https://doi.org/10.3390/app11041809
Chouliaras N, Kittes G, Kantzavelou I, Maglaras L, Pantziou G, Ferrag MA. Cyber Ranges and TestBeds for Education, Training, and Research. Applied Sciences. 2021; 11(4):1809. https://doi.org/10.3390/app11041809
Chicago/Turabian StyleChouliaras, Nestoras, George Kittes, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, and Mohamed Amine Ferrag. 2021. "Cyber Ranges and TestBeds for Education, Training, and Research" Applied Sciences 11, no. 4: 1809. https://doi.org/10.3390/app11041809
APA StyleChouliaras, N., Kittes, G., Kantzavelou, I., Maglaras, L., Pantziou, G., & Ferrag, M. A. (2021). Cyber Ranges and TestBeds for Education, Training, and Research. Applied Sciences, 11(4), 1809. https://doi.org/10.3390/app11041809