An Ontology-Based Framework for Semantic Representation of the Cyber Range Domain
Abstract
1. Introduction
- Contribution: To fill this gap, this paper presents an ontology-based framework that organizes and semantically connects and relates the diverse layers, modules, functionalities, and roles involved in a CR ecosystem. Importantly, the proposed ontology does not constitute a direct representation or encoding of an existing architecture blueprint or taxonomy. Rather, it constitutes a semantic meta-model over architectural knowledge. In other words, structured classifications, taxonomies, or architectures of CRs are inherently semi-formal and lack logical semantics. The ontology introduced in this work aims to abstract and formalize such architectural knowledge into a machine-interpretable framework enriched with constraints, dependency relations, and inference mechanisms. Consequently, the contribution lies not in reproducing architectural diagrams in OWL, but in transforming architectural knowledge into a logically grounded model that supports automated reasoning, validation, and capability inference. The contribution of this work is structured in three phases as follows.
- Phase1 (Modeling): We develop the conceptual model of the core elements that constitute a CR. This includes translating widely used classifications and design aspects into a unified and computationally interpretable ontology that defines a common language for describing CRs in a consistent and unambiguous manner.
- Phase2 (Implementation): We implement the proposed conceptual model using Protégé [18] and formalize it in Resource Description Framework (RDF) and Extensible Markup Language (XML) formats, thereby producing a structured ontology that captures the relationships, dependencies, and compositional structures among the various design parameters of CRs. This implementation supports structured analysis, enhances transparency, and enables more informed and explainable decision-making during the CR design and evaluation process.
- Phase3 (Validation): We validate the proposed ontology through an indicative CR [19], demonstrating how the multi-layer modeling approach, which distinguishes between descriptive, operational, and capability-related aspects, provides a holistic and interpretable representation of CR ecosystems. This validation highlights the ontology’s ability to facilitate comparability and repeatability across heterogeneous CR platforms and use cases.
2. Related Work
3. Background
3.1. Cyber Ranges
3.2. Ontologies
- Provide a shared and common understanding of structured information among HitL and machines or software agents.
- Support the reuse of domain knowledge across applications and systems.
- Enable interoperability among heterogeneous models and domain-specific vocabularies.
- Facilitate and simplify communication among HitL, computational systems, and between them.
- Offer expressive capabilities for capturing contextual knowledge from diverse and heterogeneous sources.
4. Ontology Model
4.1. Modeling Scope
- Decisional aspects: They represent strategic, organizational, and architectural choices made at early CR design stages. In this sense, they define the purpose, scope, and constraints of the CR, including decisions related to infrastructure, including the delivery model, governance, and virtualization technologies, as well as decisions regarding the CR scope, such as target audience, pedagogical objectives, and evaluation practices. Collectively, decisional aspects condition and influence all subsequent functional and informational elements of the CR.
- Functional aspects: They capture the operational behaviors, services, and mechanisms provided by the CR to realize its intended objectives, as defined by the decisional aspects. Specifically, this class of aspects describes what the CR does at runtime, including functionalities such as simulation and emulation, orchestration and automation, monitoring, learning management, and user interaction.
- Informational aspects: They describe the data-centric dimension of the CR, encompassing the information objects that are generated, consumed, processed, or stored during its operation. Typical informational elements include scenarios, configuration artifacts, logs, telemetry data, learning content, and evaluation results. Keep in mind that informational aspects are explicitly linked to the functional aspects that produce or consume them.
- Capabilities: They express higher-level competencies enabled by the CR through the combined realization of decisional, functional, and informational aspects. Rather than referring to individual components or services, capabilities designate what the CR is able to support (e.g., attack simulation, defensive training, or incident response evaluation).
4.2. Model Design
4.2.1. Classes (Concepts)
- DecisionalAspect: Represents high-level architectural and strategic decisions made during CR conception, such as technology selection or CR focus.
- FunctionalAspect: Encapsulates runtime behaviors, services, and technical modules that operationalize the CR’s objectives (e.g., monitoring, automation).
- InformationalAspect: Covers the data-related artifacts involved in the CR, including configurations, telemetry, logs, or learning content.
- InfrastructureFunctionalAspect, RLMSFunctionalAspect,UserOrientedFunctionalAspect
- InfrastructureInformationalAspect, RLMSInformationalAspect,UserOrientedInformationalAspect
- InfrastructureDecisionalAspect: Includes choices like virtualization technology, infrastructure type, or delivery model.
- ScopeDecisionalAspect: Covers decisions regarding pedagogical strategies, user types, curricula, and evaluation methods.
- Component: A generic abstraction for tangible software or infrastructure elements, further specialized as InfrastructureComponent, RLMSComponent, and UserOrientedComponent.
- UserEntity: Represents human actors or groups participating in the CR, with common roles such as Trainee, Instructor, and Team.
4.2.2. Properties (Relationships)
- Object Properties. Object properties describe relationships between instances of ontology classes. Namely, they formulate the semantic backbone of the model, allowing a CyberRange to be represented as a structured and interrelated ecosystem rather than as an isolated conceptual entity.
- Datatype Properties. In contrast to object properties, datatype properties connect ontology instances to literal values (e.g., strings, identifiers, or numeric attributes). They are primarily used for descriptive annotations rather than structural reasoning. Core metadata properties such as hasName and hasDescription provide human-readable labels and explanations for ontology entities. Versioning and traceability are supported through properties such as hasVersion and hasID. Additional optional attributes, including hasPriority, hasLevel, hasTimestamp, or hasDuration, may be used to annotate complexity, criticality, or temporal characteristics when required by specific use cases.
4.2.3. Axioms (Constraints)
4.2.4. Summary of Ontology Elements
5. Implementation
- Consistency checking: The reasoner automatically detects violations of disjointness axioms, domain and range constraints, and cardinality restrictions.
- Structural completeness: The reasoner verifies that each CyberRange instance satisfies minimum cardinality requirements, ensuring the presence of decisional, functional, and informational aspects as mandated by the ontology model introduced in Section 4.
- Implicit classification: The reasoner infers class memberships based on asserted object property relations and their declared domain and range constraints.
- Capability inference: The reasoner applies property-chain axiom (1) to propagate enabled capabilities from functional aspects to the corresponding CyberRange instance.
- Constraint enforcement: The reasoner ensures that decisional aspects semantically constrain admissible functional and informational realizations, maintaining coherence between design-time decisions and runtime behavior.
6. Validation
- Key Takeaways: KYPO was selected as an illustrative instantiation case because it is open-source, well-documented, and sufficiently rich to exercise the proposed ontology’s structural and reasoning mechanisms, as previously mentioned. However, it should be noted that the ontology itself is not restricted to virtualized CRs such as KYPO. Namely, at the schema level, it explicitly models architectural variation through decisional aspects such as domain, infrastructure type, delivery model, governance, and virtualization technology, which semantically constrain the admissible functional and informational realizations of a CR. Simply put, this design allows the same ontology to describe hybrid cyber–physical ranges, distributed or federated environments, and other architectural configurations. Accordingly, the present validation should be interpreted as a proof-of-instantiation and reasoning feasibility, rather than as an exhaustive empirical coverage of heterogeneous CR architectural paradigms.
7. Visualization
8. Limitations & Future Work
- Abstraction Level. The ontology is conceptualized and instantiated at a domain abstraction level and does not capture low-level implementation details of specific CR platforms. Namely, it models architectural, functional, informational, and decisional aspects in a technology-agnostic manner. Consequently, highly platform-specific configurations, deployment scripts, infrastructure-as-code artifacts, or detailed runtime orhestration logic are intentionally abstracted. This design choice enhances generalizability and cross-platform comparability, but it limits direct operational automation or platform-level configuration assembly without additional extensions. In this context, future research may focus on extending the ontology with optional implementation-level modules that align CR functional aspects with concrete deployment descriptors (e.g., container orchestration manifests, virtualization templates, or network configuration schemas). Specifically, structured deployment artifacts, such as Terraform specifications, Ansible playbooks, Yet Another Markup Language (YAML)-based descriptors, or virtualization templates, could be processed through dedicated parsers and schema-mapping layers to extract infrastructure entities, services, dependencies, and configuration parameters, which could then be transformed into ontology individuals and semantic relations. Such extensions could facilitate automation of CR deployment workflows while preserving the abstraction principles of the existing ontology.
- Scalability of Instance-Level Reasoning. The current validation does not assess the computational scalability of the proposed framework under large ABox populations that may be generated by dynamic runtime artifacts, extensive configuration data, or assessment-related information. In such settings, performance overhead would be expected to arise both from repeated instance-level OWL reasoning over growing volumes of asserted individuals and from SPARQL query execution over increasingly populated knowledge bases. This is particularly relevant in large-scale, multi-team, or federated CR environments, where both inference cost and query response time may become critical practical factors. Therefore, the ontology is currently more appropriate as a semantic abstraction layer over curated runtime summaries than as a direct reasoning and query mechanism over raw high-frequency operational streams. In this direction, a meaningful future avenue is investigating benchmark-driven scalability assessment, including incremental reasoning strategies, query optimization and indexing techniques, and hybrid semantic architectures in which large-volume runtime telemetry is pre-processed externally and only semantically relevant aggregates or events are injected into the ontology for higher-level inference and scalable knowledge-base access.
- Expressiveness Boundaries. Although the ontology conforms to the OWL 2 DL, supporting decidable reasoning, its expressive power is bounded by DL semantics. That is, complex procedural constraints, dynamic workflows, temporal sequencing of CR activities, or conditional logic between events beyond the native representational scope of DL-based ontologies. Such behaviors would require rule-based extensions (e.g., SWRL) or integration with process-oriented formalisms. Future extensions may investigate the integration of rule-based reasoning mechanisms or alignment with process modeling frameworks (e.g., BPMN-derived ontologies or temporal logics) to represent dynamic CR workflows and event-driven behavior.
- Absence of Quantitative Evaluation Modeling. The ontology emphasizes structural and semantic relationships rather than quantitative evaluation metrics. Performance indicators, scalability measurements, resource utilization metrics, or detailed learning analytics are not formally encoded beyond optional datatype annotations. As a result, quantitative assessment of CR effectiveness remains outside the current modeling scope. Future research may incorporate dedicated evaluation and performance modeling modules, potentially through alignment with metric-oriented ontologies, learning analytics vocabularies, or evaluation formulas, such as the ones introduced in [14]. Such extensions would help the formal representation of CR attributes and support maturity assessment and benchmarking across heterogeneous platforms.
- Structural Capability Inference. Capability inference is currently based on structural composition through property-chain axioms, as highlighted in the property-chain axiom (1). This mechanism supports automated classification and traceability; however, it does not evaluate the qualitative adequacy, performance level, or maturity of the supported capability. Therefore, the ontology determines whether a capability is structurally supported, but not the degree to which it is effectively realized. Future work may explore the incorporation of graded or weighted capability models, integrating qualitative assessment criteria or maturity-level ontologies. Specifically, a theoretically feasible extension would involve associating capability-supporting entities with quantitative indicators through datatype properties, thereby enabling threshold-based classification of maturity levels within OWL 2 DL. In this way, inferred capabilities could be further qualified according to their degree of readiness, coverage, automation, or similar evaluation dimensions. However, more expressive mechanisms, such as weighted metric aggregation and temporally ordered reasoning over capability realization, would require complementary rule-based or process-oriented semantic extensions beyond the native scope of OWL 2 DL. Ultimately, such enhancements could allow reasoning not only about capability presence but also about capability quality, effectiveness, or operational readiness.
- Scope of Empirical Validation. While current validation confirms logical consistency and structural integrity through an illustrative case-study instantiation, broader empirical validation across heterogeneous CR deployments would further strengthen the versatility of the proposed model. Although the selected CR platform provides a representative and well-documented example, future validation efforts may involve instantiating the ontology across multiple CR platforms with diverse architectural paradigms and conducting comparative capability analyses. For example, extending validation to CR instances with heterogeneous architectural characteristics, including CPS-oriented and federated deployments [40,41], would support assessment of the ontology’s portability and the stability of its reasoning patterns across substantially different CR implementations.
- Quantitative Assessment of the Ontology. The current study validates the ontology primarily through logical consistency, illustrative instantiation, and competency-question-driven querying, but it does not provide a quantitative evaluation of the framework itself in terms of performance, usability, or empirical benchmarking across multiple CR instances. As a result, the practical applicability of the proposed approach is assessed qualitatively rather than through quantitative metrics. Therefore, future work may investigate benchmark-based evaluation protocols, comparative instantiation studies, and user-oriented assessment methods to more rigorously evaluate the utility, scalability, and applicability of the ontology in diverse CR settings.
- Human-in-the-Loop Semantics. The current ontology captures agent-related aspects only at the level of roles (UserType and UserTeam) within the CR environment, without modeling HitL semantics. In this context, cognitive, behavioral, and expertise-related characteristics of agents, including decision-making patterns, learning progression, or adaptive responses, remain outside the present scope of the framework. In this direction, future work can investigate richer semantic representations of human and autonomous agents in CR settings, particularly for scenarios involving adaptive training, intelligent assistance, or cognitively informed evaluation processes.
- Visualization Prototype Maturity. The web-based visualization layer introduced in Section 7 is currently implemented as a lightweight PoC interface intended to demonstrate the practical feasibility of exposing ontology content and SPARQL-based reasoning outcomes to non-expert stakeholders. As such, it does not yet constitute a full-featured production environment and presently offers only a limited set of interaction mechanisms, centered on ontology upload, dashboard-style summaries, and ad hoc SPARQL query execution. Future work may therefore extend this layer with richer visualization and interaction capabilities, including predefined CQ templates, graphical dependency views, capability-oriented dashboards, result filtering and export, and comparative visual analytics across multiple uploaded CR ontology instances.
9. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
Abbreviations
| API | Application Programming Interface |
| CI | Critical Infrastructures |
| CPS | Cyber–Physical Systems |
| CR | Cyber Ranges |
| CQ | Competency Questions |
| CtF | Capture-the-Flag |
| CTI | Cyber Threat Intelligence |
| CyRIS | Cyber Range Instantiation System |
| DL | Description Logic |
| DSL | Domain-Specific Language |
| HitL | Humans-in-the-Loop |
| IT | Information Technology |
| IaC | Infrastructure-as-Code |
| LLMs | Large Language Models |
| OWL | Web Ontology Language |
| PoC | Proof-of-Concept |
| RAG | Retrieval-Augmented Generation |
| RDF | Resource Description Framework |
| RLMS | Range Learning and Management System |
| SDL | Scenario Definition Language |
| SWRL | Semantic Web Rule Language |
| YAML | Yet Another Markup Language |
| XML | Extensible Markup Language |
References
- Makrakis, G.M.; Kolias, C.; Kambourakis, G.; Rieger, C.; Benjamin, J. Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents. IEEE Access 2021, 9, 165295–165325. [Google Scholar] [CrossRef]
- Kampourakis, V.; Gkioulos, V.; Katsikas, S. A systematic literature review on wireless security testbeds in the cyber-physical realm. Comput. Secur. 2023, 133, 103383. [Google Scholar] [CrossRef]
- Falliere, N.; Murchu, L.O.; Chien, E. W32. stuxnet dossier. White Pap. Symantec Corp. Secur. Response 2011, 5, 29. [Google Scholar]
- Kozak, P.; Klaban, I.; Šlajs, T. Industroyer cyber-attacks on Ukraine’s critical infrastructure. In Proceedings of the 2023 International Conference on Military Technologies (ICMT); IEEE: New York, NY, USA, 2023; pp. 1–6. [Google Scholar] [CrossRef]
- Salazar, L.; Castro, S.R.; Lozano, J.; Koneru, K.; Zambon, E.; Huang, B.; Baldick, R.; Krotofil, M.; Rojas, A.; Cardenas, A.A. A Tale of Two Industroyers: It was the Season of Darkness. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP); IEEE: New York, NY, USA, 2024; pp. 312–330. [Google Scholar] [CrossRef]
- Datta, P. Hannibal at the gates: Cyberwarfare & the Solarwinds sunburst hack. J. Inf. Technol. Teach. Cases 2022, 12, 115–120. [Google Scholar]
- Kampourakis, V.; Kavallieratos, G.; Gkioulos, V.; Katsikas, S. Cracks in the chain: A technical analysis of real-life supply chain security incidents. Comput. Secur. 2025, 159, 104673. [Google Scholar] [CrossRef]
- Beerman, J.; Berent, D.; Falter, Z.; Bhunia, S. A Review of Colonial Pipeline Ransomware Attack. In Proceedings of the 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW); IEEE: New York, NY, USA, 2023; pp. 8–15. [Google Scholar] [CrossRef]
- Kampourakis, V.; Gkioulos, V.; Katsikas, S. A step-by-step definition of a reference architecture for cyber ranges. J. Inf. Secur. Appl. 2025, 88, 103917. [Google Scholar] [CrossRef]
- Kampourakis, V. Secure Infrastructure for Cyber-Physical Ranges. In Proceedings of the Research Challenges in Information Science: Information Science and the Connected World; Springer Nature: Cham, Switzerland, 2023; pp. 622–631. [Google Scholar] [CrossRef]
- Katsantonis, M.N.; Manikas, A.; Mavridis, I.; Gritzalis, D. Cyber range design framework for cyber security education and training. Int. J. Inf. Secur. 2023, 22, 1005–1027. [Google Scholar] [CrossRef]
- Yamin, M.M.; Katt, B.; Gkioulos, V. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 2020, 88, 101636. [Google Scholar] [CrossRef]
- Ukwandu, E.; Farah, M.A.B.; Hindy, H.; Brosset, D.; Kavallieros, D.; Atkinson, R.; Tachtatzis, C.; Bures, M.; Andonovic, I.; Bellekens, X. A Review of Cyber-Ranges and Test-Beds: Current and Future Trends. Sensors 2020, 20, 7148. [Google Scholar] [CrossRef] [PubMed]
- Kampourakis, V.; Kavallieratos, G.; Spathoulas, G.; Gkioulos, V.; Katsikas, S. LLM-Assisted AHP for Explainable Cyber Range Evaluation. arXiv 2025, arXiv:2512.10487. [Google Scholar] [CrossRef]
- Wen, S.F.; Yamin, M.M.; Katt, B. Ontology-Based Scenario Modeling for Cyber Security Exercise. In Proceedings of the 2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW); IEEE: New York, NY, USA, 2021; pp. 249–258. [Google Scholar] [CrossRef]
- Akbar, K.A.; Rahman, F.I.; Singhal, A.; Khan, L.; Thuraisingham, B. The Design and Application of a Unified Ontology for Cyber Security. In Proceedings of the Information Systems Security; Springer: Cham, Switzerland, 2023; pp. 23–41. [Google Scholar] [CrossRef]
- NIST. The Design and Application of A Unified Ontology for Cyber Security. 2026. Available online: https://www.nist.gov/publications/design-and-application-unified-ontology-cyber-security (accessed on 15 April 2026).
- University, S. Protégé: A Free, Open-Source Ontology Editor and Framework for Building Intelligent Systems. 2016. Available online: https://protege.stanford.edu/ (accessed on 15 April 2026).
- Vykopal, J.; Oslejsek, R.; Celeda, P.; Vizvary, M.; Tovarnak, D. KYPO Cyber Range: Design and Use Cases. In Proceedings of the Proceedings of the 12th International Conference on Software Technologies—ICSOFT; INSTICC, SciTePress: Setúbal, Portugal, 2017; pp. 310–321. [Google Scholar] [CrossRef]
- Bernardinetti, G.; Iafrate, S.; Bianchi, G. Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios. In Proceedings of the 16th International Conference on Availability, Reliability and Security; Association for Computing Machinery: New York, NY, USA, 2021; ARES ’21. [Google Scholar] [CrossRef]
- Pham, C.; Tang, D.; Chinen, K.i.; Beuran, R. CyRIS: A Cyber Range Instantiation System for Facilitating Security Training. In Proceedings of the 7th Symposium on Information and Communication Technology; Association for Computing Machinery: New York, NY, USA, 2016; SoICT ’16; pp. 251–258. [Google Scholar] [CrossRef]
- Gallus, P.; Klaban, I.; Františ, P.; Šlajs, T. Modular Cybersecurity Scenario Development and Its Integration into the Cyber Range Platform. In Proceedings of the 2025 Communication and Information Technologies (KIT); IEEE: New York, NY, USA, 2025; pp. 1–6. [Google Scholar] [CrossRef]
- OWASP. OWASP Top Ten 2025. 2025. Available online: https://owasp.org/www-project-top-ten/ (accessed on 24 November 2025).
- Russo, E.; Costa, G.; Armando, A. Building next generation Cyber Ranges with CRACK. Comput. Secur. 2020, 95, 101837. [Google Scholar] [CrossRef]
- OASIS. OASIS Topology and Orchestration Specification for Cloud Applications (TOSCA) TC. 2025. Available online: https://www.oasis-open.org/committees/tc_home.php?wg_abbrev=tosca (accessed on 24 November 2025).
- Gustafsson, T.; Almroth, J. Cyber Range Automation Overview with a Case Study of CRATE. In Proceedings of the Secure IT Systems; Asplund, M., Nadjm-Tehrani, S., Eds.; Springer: Cham, Switzerland, 2021; pp. 192–209. [Google Scholar] [CrossRef]
- Yamin, M.M.; Katt, B. Modeling and executing cyber security exercise scenarios in cyber ranges. Comput. Secur. 2022, 116, 102635. [Google Scholar] [CrossRef]
- Mudassar Yamin, M.; Hashmi, E.; Ullah, M.; Katt, B. Applications of LLMs for Generating Cyber Security Exercise Scenarios. IEEE Access 2024, 12, 143806–143822. [Google Scholar] [CrossRef]
- Gruber, T.R. A translation approach to portable ontology specifications. Knowl. Acquis. 1993, 5, 199–220. [Google Scholar] [CrossRef]
- Wand, Y.; Storey, V.C.; Weber, R. An ontological analysis of the relationship construct in conceptual modeling. ACM Trans. Database Syst. 1999, 24, 494–528. [Google Scholar] [CrossRef]
- Uschold, M.; Gruninger, M. Ontologies: Principles, methods and applications. Knowl. Eng. Rev. 1996, 11, 93–136. [Google Scholar] [CrossRef]
- Horrocks, I.; Kutz, O.; Sattler, U. The Even More Irresistible SROIQ. Kr 2006, 6, 57–67. [Google Scholar]
- University, M. CyberRangeCZ Platform. 2020. Available online: https://docs.platform.cyberrange.cz/ (accessed on 15 April 2026).
- Sapák, T. kypo-Crp-Tf-Deployment. 2020. Available online: https://gitlab.ics.muni.cz/muni-kypo-crp/devops/kypo-crp-tf-deployment (accessed on 15 April 2026).
- Univeristy, M. Kypo Cyber Range Platform. 2020. Available online: https://crp.kypo.muni.cz/ (accessed on 15 April 2026).
- Švábenský, V.; Vykopal, J.; Seda, P.; Čeleda, P. Dataset of shell commands used by participants of hands-on cybersecurity training. Data Brief 2021, 38, 107398. [Google Scholar] [CrossRef] [PubMed]
- Vykopal, J.; Vizvary, M.; Oslejsek, R.; Celeda, P.; Tovarnak, D. Lessons learned from complex hands-on defence exercises in a cyber range. In Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE); IEEE: New York, NY, USA, 2017; pp. 1–8. [Google Scholar] [CrossRef]
- Makhlouf, A.; Percebois, C.; Tran, H.N. Two-Level Reasoning About Graph Transformation Programs. In Proceedings of the Graph Transformation; Guerra, E., Orejas, F., Eds.; Springer: Cham, Switzerland, 2019; pp. 111–127. [Google Scholar] [CrossRef]
- Kampourakis, V. An Ontology-Based Framework for Cyber Range Representation. 2026. Available online: https://github.com/byrkam/CR-ontology (accessed on 15 April 2026).
- Lal, C.; Yamin, M.M.; Spathoulas, G. Navigating cyber range federations: An exploration of current landscape, obstacles, and prospects. Int. J. Inf. Secur. 2026, 25, 53. [Google Scholar] [CrossRef]
- Oikonomou, N.; Mengidis, N.; Spanopoulos-Karalexidis, M.; Voulgaridis, A.; Merialdo, M.; Raisr, I.; Hanson, K.; de La Vallee, P.; Tsikrika, T.; Vrochidis, S.; et al. ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR); IEEE: New York, NY, USA, 2021; pp. 403–408. [Google Scholar] [CrossRef]











| Ref. | Year | Focus | Scenario Modeling | Infr. Orch. | Knowledge Model | Coverage |
|---|---|---|---|---|---|---|
| [20] | 2021 | Exercise packaging & deployment | Y | Y | N | Partial |
| [21] | 2016 | CR instantiation automation | Y | Y | N | Partial |
| [22] | 2025 | IaC-based scenario deployment | Y | Y | N | Partial |
| [24] | 2020 | Declarative scenario specification (SDL) | Y | Y | N | Partial |
| [26] | 2021 | Automation survey & orchestration | N | Y | N | Limited |
| [27] | 2022 | Model-driven scenario automation | Y | Y | N | Partial |
| [28] | 2024 | LLM-assisted scenario generation | Y | N | N | Limited |
| [15] | 2021 | Scenario ontology modeling | Y | N | Y | Scenario-only |
| [16,17] | 2023 | Unified cybersecurity ontology for CTI | N | N | Y | None |
| This Work | 2026 | Ontology-based CR engineering | Y | Y | Y | End-to-end |
| Element Type | Name | Description |
|---|---|---|
| Classes (Concepts) | ||
| Class | CyberRange | Root entity representing a complete CR instance |
| Class | DecisionalAspect | Abstract class for design-time decisions |
| Class | FunctionalAspect | Abstract class for runtime behaviors and services |
| Class | InformationalAspect | Abstract class for data artifacts and information objects |
| Class | Capability | Emergent competencies enabled by the CR |
| Class | Component | Abstract technical module implementing functional aspects |
| Class | UserEntity | Human actors participating in CR activities |
| Subclass | InfrastructureDecisionalAspect | Infrastructure-related design decisions |
| Subclass | ScopeDecisionalAspect | Pedagogical and audience-oriented decisions |
| Subclass | InfrastructureFunctionalAspect | Infrastructure-layer functionalities |
| Subclass | RLMSFunctionalAspect | RLMS-layer functionalities |
| Subclass | UserOrientedFunctionalAspect | User-facing services and mechanisms |
| Subclass | InfrastructureInformationalAspect | Infrastructure-generated data artifacts |
| Subclass | RLMSInformationalAspect | RLMS-related informational artifacts |
| Subclass | UserOrientedInformationalAspect | User-facing or user-generated artifacts |
| Subclass | InfrastructureComponent, RLMSComponent, UserOrientedComponent | Layer-specific component implementations |
| Controlled Classes | Governance, DeliveryModel, InfrastructureType, VirtualizationTechnology, Domain, Scope | Infrastructure decisional vocabularies |
| Controlled Classes | LearningMethod, EvaluationPractice, CurriculumType, Purpose, Didactics, UserType, UserTeam | Scope decisional vocabularies |
| Object Properties | ||
| Aggregation | hasDecisionalAspect/isDecisionalAspectOf | Links CR to decisional aspects (inverse defined) |
| Aggregation | hasFunctionalAspect/isFunctionalAspectOf | Links CR to functional aspects (inverse defined) |
| Aggregation | hasInformationalAspect/isInformationalAspectOf | Links CR to informational aspects (inverse defined) |
| Aggregation | supportsCapability | Declares capabilities supported by a CR |
| Dependency | constrainsFunction | DecisionalAspect → FunctionalAspect |
| Dependency | constrainsInformation | DecisionalAspect → InformationalAspect |
| Dependency | constrainsUsers | DecisionalAspect → UserEntity |
| Runtime Flow | producesInformation/consumesInformation | FunctionalAspect → InformationalAspect (inverse defined) |
| Capability Realization | enablesCapability/isSupportedByAspect | Functional/InformationalAspect → Capability (inverse defined) |
| Grounding | hasComponent | Links FunctionalAspect to implementing Component |
| Grounding | hasUserEntity | Associates aspects or CR with UserEntity |
| Specialization | hasGovernance, hasDeliveryModel, hasInfrastructureType, hasVirtualizationTechnology, hasDomain, hasScope | Infrastructure decisional specialization |
| Specialization | hasLearningMethod, hasEvaluationPractice, hasCurriculaType, hasPurpose, targetsLearningObjective, targetsDidactics, definesUserType, definesUserTeam | Scope decisional specialization |
| Datatype Properties | ||
| Metadata | hasName, hasDescription | Human-readable annotations |
| Traceability | hasID, hasVersion | Identification and version control |
| Annotation | hasPriority, hasLevel | Complexity or criticality attributes |
| Optional | hasTimestamp, hasDuration | Temporal annotations when required |
| Axioms and Constraints | ||
| Disjointness | Aspect Classes Disjoint | |
| Disjointness | Layer Subclasses Disjoint | Infrastructure ⊥ RLMS ⊥ UserOriented subclasses |
| Disjointness | Capability Disjointness | Aspect ⊥ Component; Component ⊥ UserEntity |
| Domain/Range | Property Restrictions | Explicit domain and range constraints for all object properties |
| Cardinality | Structural Completeness | Each CR has ≥1 decisional, functional, informational aspect |
| Cardinality | Capability Support | Each Capability enabled by ≥1 aspect |
| Inverse Properties | Bidirectional Reasoning | |
| Property Chain | Capability Inference | |
| Component | Description |
|---|---|
| Frontend framework | React 19.2.4 |
| Frontend build tool | Vite 8.0.3 |
| Backend language | Python 3.9.11 |
| Backend framework | Flask 3.1.3 |
| RDF/SPARQL library | RDFLib 7.6.0 |
| Operating system | MS 11 10.0.26200 |
| Processor | Intel(R) Core(TM) i7-10700 CPU @ 2.90 GHz |
| Memory | 16 GB RAM |
| Open-Source Repository | [39] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Kampourakis, V.; Takaronis, M.; Gkioulos, V.; Katsikas, S. An Ontology-Based Framework for Semantic Representation of the Cyber Range Domain. J. Cybersecur. Priv. 2026, 6, 76. https://doi.org/10.3390/jcp6020076
Kampourakis V, Takaronis M, Gkioulos V, Katsikas S. An Ontology-Based Framework for Semantic Representation of the Cyber Range Domain. Journal of Cybersecurity and Privacy. 2026; 6(2):76. https://doi.org/10.3390/jcp6020076
Chicago/Turabian StyleKampourakis, Vyron, Michail Takaronis, Vasileios Gkioulos, and Sokratis Katsikas. 2026. "An Ontology-Based Framework for Semantic Representation of the Cyber Range Domain" Journal of Cybersecurity and Privacy 6, no. 2: 76. https://doi.org/10.3390/jcp6020076
APA StyleKampourakis, V., Takaronis, M., Gkioulos, V., & Katsikas, S. (2026). An Ontology-Based Framework for Semantic Representation of the Cyber Range Domain. Journal of Cybersecurity and Privacy, 6(2), 76. https://doi.org/10.3390/jcp6020076

