skip to main content
10.1145/3424954.3424959acmotherconferencesArticle/Chapter ViewAbstractPublication PageseiccConference Proceedingsconference-collections
research-article
Open Access

AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research

Authors Info & Claims
Published:12 January 2021Publication History

ABSTRACT

With the evolution of threats and attacks and the speed of automation, new modern training and learning environments are needed to support the challenges of digital organizations and societies. In recent years, cyber ranges, i.e., virtual environments that support the simulation of diverse infrastructures, have emerged and are often utilized for cyber security exercises or training. With these environments, organizations or individuals can increase their preparedness and dexterity, for example, by training to identify and mitigate incidents and attacks. In this paper, we present the AIT Cyber Range which was designed based on several principles such as scalability, flexibility and the utilization of Open Source technologies. This paper outlines the building blocks of the architecture and implementation: computing platform, infrastructure provisioning, software provisioning and scenario engine. Furthermore, the implementation is demonstrated by three use cases: cyber exercises, training as well as security research and development. For future work, we aim to further extend the building blocks and to address federation and interoperability with other cyber ranges.

References

  1. David Allison, Paul Smith, Kieran McLaughlin, Fan Zhang, Jamie Coble, and Rodney Busquim. 2020. PLC-based Cyber-Attack Detection: A Last Line of Defence. In IAEA International Conference on Nuclear Security: Sustaining and Strengthening Efforts. IAEA, 10. https://conferences.iaea.org/event/181/contributions/15513/Google ScholarGoogle Scholar
  2. Agnė Brilingaitė, Linas Bukauskas, and Eduardas Kutka. 2017. Development of an Educational Platform for Cyber Defence Training. In European Conference on Cyber Warfare and Security. Academic Conferences International Limited, 73--81.Google ScholarGoogle Scholar
  3. Jon Davis and Shane Margath. 2013. A Survey of Cyber Ranges and Testbeds. Technical Report DSTO -GD -0771. Cyber Electronic Warfare Division, DSTO Defence Science and Technology Organisation, Edinburgh, South Australia 5111, Australia. http://www.dtic.mil/dtic/tr/fulltext/u2/a594524.pdfGoogle ScholarGoogle Scholar
  4. Tamara Denning, Adam Lerner, Adam Shostack, and Tadayoshi Kohno. 2013. Control-Alt-Hack: the design and evaluation of a card game for computer security awareness and education. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (CCS '13). ACM, Berlin, Germany, 915--928.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. ECSO. 2020. Understanding Cyber Ranges: From Hype to Reality. WG5 PAPER. European Cyber Security Organisation (ECSO), Brussels, Belgium. 31 pages. https://www.ecs-org.eu/documents/uploads/understanding-cyber-ranges-from-hype-to-reality.pdfGoogle ScholarGoogle Scholar
  6. ENISA. 2015. The 2015 Report on National and International Cyber Security Exercises. Technical Report 1.0. European Union Agency for Network and Information Security (ENISA), Heraklion, Greece. 32 pages. https://www.enisa.europa.eu/publications/latest-report-on-national-and- international- cyber-security-exercises/at_download/fullReportGoogle ScholarGoogle Scholar
  7. B. Ferguson, A. Tall, and D. Olsen. 2014. National Cyber Range Overview. In 2014 IEEE Military Communications Conference (MILCOM). IEEE, Baltimore, MD, 123--128.Google ScholarGoogle Scholar
  8. M. Frank, M. Leitner, and T. Pahi. 2017. Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education. In 2017 IEEE 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress. IEEE, Orlando, FL, USA, 38--46. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.23Google ScholarGoogle Scholar
  9. Sylvain Frey, Awais Rashid, Pauline Anthonysamy, Maria Pinto-Albuquerque, and Syed Asad Naqvi. 2019. The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game. IEEE Transactions on Software Engineering 45, 5 (May 2019), 521--536. https://doi.org/10.1109/TSE.2017.2782813Google ScholarGoogle ScholarCross RefCross Ref
  10. J. Kim, Y. Maeng, and M. Jang. 2019. Becoming Invisible Hands of National Live-Fire Attack-Defense Cyber Exercise. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). IEEE, Stockholm, Sweden, 77--84.Google ScholarGoogle Scholar
  11. Stela Kucek and Maria Leitner. 2020. An Empirical Survey of Functions and Configurations of Open-Source Capture the Flag (CTF) Environments. Journal of Network and Computer Applications 151 (Feb. 2020), 102470. https://doi.org/10.1016/j.jnca.2019.102470Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Stela Kucek and Maria Leitner. 2020. Training the Human-in-the-Loop in Industrial Cyber Ranges. In Digital Transformation in Semiconductor Manufacturing (Lecture Notes in Electrical Engineering), Sophia Keil, Rainer Lasch, Fabian Lindner, and Jacob Lohmer (Eds.). Springer International Publishing, Cham, 107--118. https://doi.org/10.1007/978-3-030-48602-0_10Google ScholarGoogle Scholar
  13. Maria Leitner, Timea Pahi, and Florian Skopik. 2017. Situational Awareness for Strategic Decision Making on a National Level. In Collaborative Cyber Threat Intelligence, Florian Skopik (Ed.). CRC Press, 225--276.Google ScholarGoogle Scholar
  14. U.S. Department of Commerce National Institute of Standards and Technology. 2018. Cyber Ranges. Technical Report. NIST, US. https://www.nist.gov/system/files/documents/2018/02/13/cyber_ranges.pdfGoogle ScholarGoogle Scholar
  15. Cuong Pham, Dat Tang, Ken-ichi Chinen, and Razvan Beuran. 2016. CyRIS: a cyber range instantiation system for facilitating security training. In Proceedings of the Seventh Symposium on Information and Communication Technology (SoICT '16). ACM, Ho Chi Minh City, Vietnam, 251--258.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Florian Skopik, Giuseppe Settanni, Roman Fiedler, and Ivo Friedberg. 2014. Semi-synthetic data set generation for security software evaluation. In Proc. of the 12th Annual International Conference on Privacy, Security and Trust. IEEE, 156--163.Google ScholarGoogle ScholarCross RefCross Ref
  17. Ciza Thomas, Vishwas Sharma, and N Balakrishnan. 2008. Usefulness of DARPA dataset for intrusion detection system evaluation. In Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2008, Vol. 6973. International Society for Optics and Photonics, SPIE, 164--171.Google ScholarGoogle ScholarCross RefCross Ref
  18. Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupé, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, and Yan Shoshitaishvili. 2014. Ten Years of iCTF: The Good, The Bad, and The Ugly. In 2014 USENIX Summit on Gaming, Games, and Gamification in Security Education (3GSE 14). USENIX Association, San Diego, CA, 7.Google ScholarGoogle Scholar
  19. Jan Vykopal, Martin Vizvary, Radek Oslejsek, Pavel Celeda, and Daniel Tovarnak. 2017. Lessons learned from complex hands-on defence exercises in a cyber range. In 2017 IEEE Frontiers in Education Conference (FIE). IEEE Computer Society, Indianapolis, IN, USA, 1--8. https://doi.org/10.1109/FIE.2017.8190713Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Markus Wurzenberger, Florian Skopik, Giuseppe Settanni, and Wolfgang Scherrer. 2016. Complex log file synthesis for rapid sandbox-benchmarking of security-and computer network analysis tools. Information Systems 60 (2016), 13--33.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Muhammad Mudassar Yamin, Basel Katt, and Vasileios Gkioulos. 2020. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Computers & Security 88 (Jan. 2020), 101636. https://doi.org/10.1016/j.cose.2019.101636Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. AIT Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        EICC '20: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference
        November 2020
        72 pages
        ISBN:9781450375993
        DOI:10.1145/3424954

        Copyright © 2020 Owner/Author

        This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike International 4.0 License.

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 January 2021

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader