Architecture of an Efficient Environment Management Platform for Experiential Cybersecurity Education
Abstract
1. Introduction
2. Cyber Range Development Cycle
3. Environment Management Platform Architecture
3.1. Template Script
3.2. Clone Script
3.3. Revert Script
3.4. Purge Script
3.5. Web Interface
4. Platform Development Technologies
4.1. Command Line Interface
4.2. Web Interface
5. A Cybersecurity Case Study
6. Results and Discussions
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Yamin, M.M.; Katt, B.; Gkioulos, V. Cyber ranges and security testbeds: Scenarios, functions, tools, and architecture. Comput. Secur. 2020, 88, 101636–101694. [Google Scholar] [CrossRef]
- Ukwandu, E.; Farah, M.A.B.; Hindy, H.; Brosset, D.; Kavallieros, D.; Atkinson, R.; Tachtatzis, C.; Bures, M.; Andonovic, I.; Bellekens, X. A Review of Cyber-Ranges and Test-Beds: Current and Future Trends. Sensors 2020, 20, 7148. [Google Scholar] [CrossRef]
- Chuoliaras, N.; Kittes, G.; Kantzavelou, I.; Maglaras, L.; Pantziou, G.; Ferrag, M.A. Cyber Ranges and Testbeds for Education, Training, and Research. Appl. Sci. 2021, 11, 1809. [Google Scholar] [CrossRef]
- Priyadarshini, I. Features and Architecture of the Modern Cyber Range: A Qualitative Analysis and Survey. Master’s Thesis, University of Delaware, Newark, DE, USA, 2018. [Google Scholar]
- Vekaria, K.B.; Calyam, P.; Wang, S.; Payyavula, R.; Rockey, M.; Ahmed, N. Cyber Range for Research-Inspired Learning of “Attack Defense by Pretense” Principle and Practice. IEEE Trans. Learn. Technol. 2021, 14, 322–337. [Google Scholar] [CrossRef]
- Willems, C.; Klingbei, T.; Radvilavicius, L.; Cenys, A.; Meinel, C. A Distributed Virtual Laboratory Architecture for Cybersecurity Training. In Proceedings of the 2011 International Conference for Internet Technology and Secured Transactions, Abu Dhabi, United Arab Emirates, 11–14 December 2011. [Google Scholar]
- Pham, C.; Tang, D.; Chinen, K.-I.; Beuran, R. CyRIS: A Cyber Range Instantiation System for Facilitating Security Training. In Proceedings of the 7th Symposium on Information and Communication Technology, Ho Chi Minh City, Vietnam, 8–9 December 2016. [Google Scholar]
- Xu, L.; Huang, D.; Tsai, W.-T. Cloud-Based Virtual Laboratory for Network Security Education. IEEE Trans. Educ. 2014, 57, 145–150. [Google Scholar] [CrossRef]
- Kalyanam, R.; Yang, B. Try-CybSI: An Extensible Cybersecurity Learning and Demonstration Platform. In Proceedings of the 18th Annual Conference on Information Technology, Rochester, NY, USA, 4–7 October 2017. [Google Scholar]
- Vykopal, J.; Vizvary, M.; Oslejsek, R.; Celeda, P.; Tovarnak, D. Lessons learned from complex hands-on defence exercises in a cyber range. In Proceedings of the 2017 IEEE Frontiers in Education Conference, Indianapolis, IN, USA, 18–21 October 2017. [Google Scholar]
- Vykopal, J.; Seda, P.; Svabensky, V.; Celeda, P. Smart Environment for Adaptive Learning of Cybersecurity Skills. IEEE Trans. Learn. Technol. 2023, 16, 443–456. [Google Scholar] [CrossRef]
- Vykopal, J.; Celeda, P.; Seda, P.; Svabensky, V.; Tovarnak, D. Scalable Learning Environments for Teaching Cybersecurity Hands-on. In Proceedings of the 2021 IEEE Frontiers in Education Conferences (FIE), Lincoln, NE, USA, 13–16 October 2021. [Google Scholar]
- Salah, K.; Hammoud, M.; Zeadally, S. Teaching Cybersecurity Using the Cloud. IEEE Trans. Learn. Technol. 2015, 8, 383–392. [Google Scholar] [CrossRef]
- Siaterlis, C.; Garcia, A.P.; Genge, B. On the Use of Emulabe Testbeds for Scientifically Rigorous Experiments. IEEE Commun. Surv. Tutor. 2013, 15, 929–942. [Google Scholar] [CrossRef]
- Sommestad, T. Experimentation on operational cyber security in CRATE. In Proceedings of the NATO STO-MP-IST-133 Special Meeting, Munich, Germany, 15–16 October 2015. [Google Scholar]
- Greenspan, R.; Laracy, J.R.; Zaman, A. Real-Time Immersive Network Simulation Environment (RINSE); University of Illinois at Urbana-Champaign: Champaign, IL, USA, 2004. [Google Scholar]
- Rossey, L.M.; Cunningham, R.K.; Fried, D.J.; Rabek, J.C.; Lippmann, R.P.; Haines, J.W.; Zissman, M.A. LARIAT: Lincoln Adaptable Real-time Information Assurance Testbed. In Proceedings of the IEEE Aerospace Conference, Big Sky, MT, USA, 9–16 March 2002. [Google Scholar]
- Cruz, T.; Simoes, P. Down the Rabbit Hole: Fostering Active Learning through Guided Exploration of a SCADA Cyber Range. Appl. Sci. 2021, 11, 9509. [Google Scholar] [CrossRef]
- Coppolino, L.; D’Antonio, S.; Formicola, V.; Giuliano, V.; Mazzeo, G. ICSrange: A Simulation-based Cyber Range Platform for Industrial Control Systems. arXiv 2020, arXiv:1909.01910. [Google Scholar] [CrossRef]
- Gunathilaka, P.; Mashima, D.; Chen, B. SoftGrid: A Software-based Smart Grid Testbed for Evaluating Substation Cybersecurity Solutions. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, Xi’an, China, 30 May 2016. [Google Scholar]
- Hammad, E.; Ezeme, M.; Farraj, A. Implementation and development of an offline co-simulation testbed for studies of power systems cyber security and control verification. Int. J. Electr. Power Energy Syst. 2019, 104, 817–826. [Google Scholar] [CrossRef]
- Nock, O.; Starkey, J.; Angelopoulos, C.M. Addressing the Security Gap in IoT: Towards and IoT Cyber Range. Sensors 2020, 20, 5439. [Google Scholar] [CrossRef] [PubMed]
- Balto, K.E.; Yamin, M.M.; Shalaginov, A.; Katt, B. Hybrid IoT Cyber Rang. Sensors 2023, 23, 3071. [Google Scholar] [CrossRef] [PubMed]
- Waraga, O.A.; Bettayeb, M.; Nasir, Q.; Talib, M.A. Design and Implementation of Automated IoT Security Testbed. Comput. Secur. 2020, 88, 101648–101675. [Google Scholar] [CrossRef]
- Lee, S.; Lee, S.; Yoo, H.; Kwon, S.; Shon, T. Design and Implementation of cybersecurity testbed for industrial IoT systems. J. Supercomput. 2018, 74, 4506–4520. [Google Scholar] [CrossRef]
- ISC2. How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce; ISC2: Alexandria, VA, USA, 2023. [Google Scholar]
- Hellmann, K. See Yourself in Cybersecurity. U.S. Department of Labor Blog, 22 September 2023. Available online: https://blog.dol.gov/2023/09/22/see-yourself-in-cybersecurity#:~:text=As%20of%20August%202022%2C%20there,cyber%20talent%20is%20in%20demand (accessed on 1 February 2024).
- Eckroth, J.; Chen, K.; Gatewood, H.; Belna, B. Alpaca: Building Dynamic Cyber Ranges with Procedurally-Generated Vulnerability Lattices. In Proceedings of the 2019 ACM Southeast Conference, Kennesaw, GA, USA, 18–20 April 2019. [Google Scholar]
- Rursch, J.A.; Jacobson, D. When a testbed does more than testing: The Internet-Scale Event Attack and Generation Environment (ISEAGE)—Providing learning and synthesizing experiences for cyber security students. In Proceedings of the 2013 IEEE Frontiers in Education Conference (FIE), Oklahoma City, OK, USA, 23–26 October 2013. [Google Scholar]
- Rursch, J.A.; Jacobson, D. This IS child’s play: Creating a “playground” (computer network testbed) for high school students to learn, practice, and compete in cyber defense competitions. In Proceedings of the 2013 IEEE Frontiers in Education Conference, Oklahoma City, OK, USA, 23–26 October 2013. [Google Scholar]
- Yasuda, S.; Miura, R.; Ohta, S.; Takano, Y.; Miyachi, T. Alfons: A Mimetic Network Environment Construction System. In Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communities: 11th International Conference (TRIDENTCOM 2017), Dalian, China, 28–29 September 2017. [Google Scholar]
- Urias, V.; Leeuwen, B.V.; Richardson, B. Supervisory Command and Data Acquisition (SCADA) system Cyber Security Analysis using a Live, Virtual, and Constructive (LVC) Testbed. In Proceedings of the Milcom 2012 IEEE Military Communications Conference, Orlando, FL, USA, 29 October–1 November 2012. [Google Scholar]
- Pfrang, S.; Kippe, J.; Meier, D.; Haas, C. Design and Architecture of an Industrial IT Security Lab. In Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communities: 11th International Conference (TRIDENTCOM 2017), Dalian, China, 28–29 September 2017. [Google Scholar]
- Luchian, E.; Filip, C.; Rus, A.B.; Ivanciu, I.-A.; Dobrota, V. Automation of the Infrastructure and Services for an OpenStack Deployment Using Chef Tool. In Proceedings of the 15th RoEduNet Conference: Networking in Education and Research, Bucharest, Romania, 7–9 September 2016. [Google Scholar]
- Kostromin, R.O. Survey of software configuration management tools of nodes in heterogeneous distributed computing environment. In Proceedings of the ICCS-DE, Online, 18–21 September 2020. [Google Scholar]
- Bergin, D.L. Cyber-attack and defense simulation framework. J. Def. Model. Simul. 2015, 12, 383–392. [Google Scholar] [CrossRef]
- Chadha, R.; Bowen, T.C.C.-Y.J.; Gottlieb, Y.M.; Poylisher, A.; Sapello, A.; Serban, C.; Sugrim, S.; Walther, G.; Marvel, L.M.; Newcomb, E.A.; et al. CyberVAN: A Cyber Security Virtual Assured Network Testbed. In Proceedings of the MILCOM 2016-2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1–3 November 2016. [Google Scholar]
- Reed, T.; Nauer, K.; Silva, A. Instrumenting Competition-Based Exercises to Evaluate Cyber Defender Situation Awareness. In Proceedings of the Foundations of Augmented Cognition: 7th International Conference, Las Vegas, NV, USA, 21–26 July 2013. [Google Scholar]
- Alvarenga, I.D.; Duarte, O.C.M.B. RIO: A Denial of Service Experimentation Platform in a Future Internet Testbed. In Proceedings of the 7th International Conference on the Network of the Future (NOF), Rio de Janeiro, Brazil, 16–18 November 2016. [Google Scholar]
- Shu, G.; Chen, D.; Liu, Z.; Li, N.; Sang, L.; Lee, D. VCSTC: Virtual Cyber Security Testing Capability—An Application Oriented Paradigm for Network Infrastructure Protection. In Proceedings of the Testing of Software and Communication Systems: 20th IFIP TC 6/WG 6.1 International Conference, Tokyo, Japan, 10–13 June 2008. [Google Scholar]
- Herold, N.; Wachs, M.; Dorfhuber, M.; Rudolf, C.; Liebald, S.; Carle, G. Achieving Reproducible Network Environments with INSALATA. In Proceedings of the Security of Networks and Services in an All-Connected World: 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure Management and Security, Zürich, Switzerland, 10–13 July 2017. [Google Scholar]
- White, B.; Lepreau, J.; Stoller, L.; Ricci, R.; Guruprasad, M.N.; Hibler, M.; Barb, C.; Joglekar, A. An Integrated Experimental Environment for Distributed Systems and Networks. ACM SIGOPS Oper. Syst. Rev. 2002, 36, 255–270. [Google Scholar] [CrossRef]
- Proxmox Server Solutions GmbH, Proxmox. 2023. Available online: https://www.proxmox.com/en/ (accessed on 1 September 2024).
- Welcome to Proxmoxer. 22 March 2022. Available online: https://proxmoxer.github.io/docs/2.0/ (accessed on 1 September 2024).
- Ford, J. Proxmox-Remote-Management. Available online: https://github.com/RedefiningReality/Proxmox-Remote-Management (accessed on 13 July 2023).
Name | Virtual Machine Features |
---|---|
clone-begin-id | Starting ID number for virtual machine clones. |
clone-type | Assign clone type as either ‘linked’ or ‘full’. |
snapshot | Creates a snapshot for each cloned virtual machine called SNAPSHOT. |
start-clone | Starts virtual machines on boot and after cloning. |
user | Creates a new Proxmox VE user for newly cloned machines. |
password | Password for the newly generated user. Default provides a randomly generated string. |
group | Adds the new user to a Proxmox VE group. |
role | Assign the new user to a Proxmox VE role. |
create-bridge | Creates a new Linux Bridge. |
bridge-subnet | Provides a newly created Linux Bridge with a subnet in CIDR notation. |
add-bridged-vms | Assign the specified virtual machines to the new Linux Bridge. |
cloud-init-static | Assign static IP addresses to the specified virtual machine clones. |
dhcp-static | Assign a static lease for the specified virtual machine clone. |
dhcp-begin | Starting address for dynamic IP assignment. |
dhcp-end | Ending address for dynamic IP assignment. |
Name | CPU | Storage | Memory | OS |
---|---|---|---|---|
DNS | 1 | 32 GB | 512 MB | Debian 11 |
Workstation | 1 | 32 GB | 512 MB | Ubuntu 20 |
Website | 1 | 32 GB | 512 MB | CentOS 7 |
Router | 1 | 32 GB | 512 MB | CentOS 7 |
Kali-Ext | 4 | 32 GB | 4 GB | Kali Linux |
Kali-Int | 4 | 32 GB | 4 GB | Kali Linux |
Name | CPU | Storage | Memory | OS |
Action | EMP Execution Time (s) | Manual Execution Time (s) |
---|---|---|
Template | 4.02 | 19.98 |
Clone | 15.75 | 202.25 |
Revert | 0.44 | 44.21 |
Purge | 10.34 | 67.20 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Arnold, D.; Ford, J.; Saniie, J. Architecture of an Efficient Environment Management Platform for Experiential Cybersecurity Education. Information 2025, 16, 604. https://doi.org/10.3390/info16070604
Arnold D, Ford J, Saniie J. Architecture of an Efficient Environment Management Platform for Experiential Cybersecurity Education. Information. 2025; 16(7):604. https://doi.org/10.3390/info16070604
Chicago/Turabian StyleArnold, David, John Ford, and Jafar Saniie. 2025. "Architecture of an Efficient Environment Management Platform for Experiential Cybersecurity Education" Information 16, no. 7: 604. https://doi.org/10.3390/info16070604
APA StyleArnold, D., Ford, J., & Saniie, J. (2025). Architecture of an Efficient Environment Management Platform for Experiential Cybersecurity Education. Information, 16(7), 604. https://doi.org/10.3390/info16070604