26,924 Hits in 7.2 sec

A next-generation platform for Cyber Range-as-a-Service [article]

Vittorio Orbinato
2021 arXiv   pre-print
However, the setup and management of Cyber Ranges are expensive and time-consuming activities. In this paper, we highlight the novel features for the next-generation Cyber Range platforms.  ...  In the last years, Cyber Ranges have become a widespread solution to train professionals for responding to cyber threats and attacks.  ...  Overview of the next-generation Cyber Range platform  ... 
arXiv:2112.11233v1 fatcat:hercjvwlkzgybay737edulu6ja

A cyberSecurity Platform for vIrtualiseD 5G cybEr Range services (SPIDER)

Neofytos Gerosavva, Manos Athanatos, Christoforos Ntantogian, Christos Xenakis, Cristina Costa, Alberto Mozo, Matthias Ghering, Angela Brignone
2021 Zenodo  
The vision of the H2020 funded project SPIDER ( is to deliver a next-generation, extensive, and replicable Cyber Range as a Service (CRaaS) platform for the telecommunications  ...  Additionally, SPIDER features integrated tools for cyber testing including advanced emulation tools, novel training methods towards active learning as well as econometric models based on real-time emulation  ...  1 Summary of the project Objectives The vision of the H2020 funded project SPIDER ( is to deliver a next-generation, extensive, and replicable Cyber Range as a Service (CRaaS  ... 
doi:10.5281/zenodo.4471359 fatcat:3rsdllubyvfj7eppw74dxyt3p4

The SPIDER concept: A Cyber Range as a Service platform

Christos Xenakis, Anna Angelogianni, Eleni Veroni, Eirini Karapistoli, Matthias Ghering, Neofytos Gerosavva, Vasilieios Machamint, Pierluigi Polvanesi, Angela Brignone, Jeronimo Nunez Mendoza, Antonio Pastor
2020 Zenodo  
The SPIDER platform proposes an innovative Cyber Range as a Service (CRaaS) platform that extends and combines the capabilities of existing telecommunication testbeds and cyber ranges into a unified facility  ...  for (i) testing new security technologies, (ii) training modern cyber defenders in near real-world conditions, and (iii) supporting organizations and relevant stakeholders in making optimal cybersecurity  ...  The EU funded SPIDER 1 project proposes an innovative Cyber Range as a Service (CRaaS) platform that extends and combines the capabilities of existing telecommunication testbeds and cyber ranges with the  ... 
doi:10.5281/zenodo.4030473 fatcat:murybpqqafbv7fqmp5egu4ag7a

KYPO Cyber Range: Design and Use Cases

Jan Vykopal, Radek Oslejsek, Pavel Celeda, Martin Vizvary, Daniel Tovarnak
2017 Proceedings of the 12th International Conference on Software Technologies  
It was especially cyber training sessions and exercises with hundreds of participants which provided invaluable feedback for KYPO platform development.  ...  The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully controlled and monitored environment.  ...  A lot of development effort has been dedicated to user interactions within KYPO since it is planned to be offered as Platform as a Service.  ... 
doi:10.5220/0006428203100321 dblp:conf/icsoft/VykopalOCVT17 fatcat:lb4stzpftrecvjchqog2oty6r4

Assessing the Impact of Cyber Attacks on Wireless Sensor Nodes That Monitor Interdependent Physical Systems [chapter]

Valerio Formicola, Antonio Di Pietro, Abdullah Alsubaie, Salvatore D'Antonio, Jose Marti
2014 IFIP Advances in Information and Communication Technology  
This paper describes a next-generation security information and event management (SIEM) platform that performs real-time impact assessment of cyber attacks that target monitoring and control systems in  ...  To assess the effects of cyber attacks on the services provided by critical infrastructures, the platform combines security analysis with simulations produced by the Infrastructure Interdependencies Simulator  ...  Related Work This section discusses related work on next-generation SIEM systems for service level monitoring and models for evaluating critical infrastructure interdependencies.  ... 
doi:10.1007/978-3-662-45355-1_14 fatcat:4rntqfqka5eidmkn3px35jydna

Cybersecurity of Cyber Ranges: Threats and Mitigations

Sami Noponen, Juha Parssinen, Jarno Salonen
2022 International Journal for Information Security Research  
Cyber ranges are often used to enhance the cybersecurity posture of a company by training relevant skills.  ...  Finally, we present actions to mitigate the identified cybersecurity threats and issues in cyber ranges when using them for training and awareness activities.  ...  [6] the next generation DT.  ... 
doi:10.20533/ijisr.2042.4639.2022.0117 fatcat:hlrqz3zlnndxfel7v4df2mjfcy

A Cyber Range for Armed Forces Education

Michal Turčaník
2020 Information & Security An International Journal  
Cyber range for educational purposes in the armed forces has been proposed taking into account the important parameters a cyber range should incorporate.  ...  Cybersecurity awareness and cyber security training are promoted by hyper-realistic virtual environments termed as cyber ranges. This article highlights the concept of a cyber range.  ...  A cyber range can also serve as test bed for developing cyber technology. Cyber range may be a virtual environment, but there are some alternatives.  ... 
doi:10.11610/isij.4622 fatcat:nyyq3dw42bfupecjjtabkbm42y

CYRA: A Model-Driven CYber Range Assurance Platform

Michail Smyrlis, Iason Somarakis, George Spanoudakis, George Hatzivasilis, Sotiris Ioannidis
2021 Applied Sciences  
Cyber Range emerges as a promising solution to effectively train people in cybersecurity aspects.  ...  Therefore, this study introduces the model-driven CYber Range Assurance platform (CYRA).  ...  The editor is offered as a web service through the Cyber Range Platform. • Lastly, the CTTP Models and Programmes adaptation tool is the tool responsible for adapting the existing training programmes and  ... 
doi:10.3390/app11115165 fatcat:7nss6h6gt5bltbh7qoi72jfv3a

Industrial Big Data Analytics and Cyber-physical Systems for Future Maintenance & Service Innovation

Jay Lee, Hossein Davari Ardakani, Shanhu Yang, Behrad Bagheri
2015 Procedia CIRP  
Such integration, which is called Cyber-physical Systems (CPS), is transforming the industry into the next level.  ...  Then it briefly discusses a systematic architecture for applying CPS in manufacturing called 5C.  ...  Although, if none being found, the algorithm generates a new cluster as a new working regime and generate related health models for that regime.  ... 
doi:10.1016/j.procir.2015.08.026 fatcat:46d5og2poffobokp36hoxkghgm

Towards a Robust and Scalable Cyber Range Federation for Sectoral Cyber/Hybrid Exercising: The Red Ranger and ECHO Collaborative Experience

George Sharkov, Christina T odorova, Georgi Koykov, Ivan Nikolov
2022 Information & Security An International Journal  
We detail the design and development to facilitate the agility required to support a working multi-faceted federation with the ECHO Cyber Range to allow for an "exercise-as-a-service" model to provide  ...  The federation of cyber ranges is one potential response to this challenge, providing a solution for the individual cyber range limitations in terms of resources to replicate complex cybersecurity-relevant  ...  The described scenario leveraged through the Red Ranger was piloted under the GB-BG Cyber Shockwave initiative, supported by the British Embassy -Sofia, Bulgaria.  ... 
doi:10.11610/isij.5319 fatcat:35jesc4iinezjeohwy6naycg6a

D2.1: State of the art cyber range technologies analysis

Marc Lamotte
2020 Zenodo  
Combined with Cyber-MAR surveys of end-users, this document is also positioned as a structuring document for the Cyber-MAR potential architecture choices.  ...  An evaluation platform and system of the Cyber Range is mandatory in order to guarantee reliability of the simulation results in return.  ...  Platform that supports on-premise or CybExer range exercises. 40 -Pay-as-you-go service -Exercise environment creation and automated deployment, customized scenario and game net creation for exercises  ... 
doi:10.5281/zenodo.5036265 fatcat:w7hzszitsfe7ji5b4nmwg27q64

A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus

Zhihong Tian, Yu Cui, Lun An, Shen Su, Xiaoxia Yin, Lihua Yin, Xiang Cui
2018 IEEE Access  
To this end, based on our previous work, the Heetian cyber range, we proposed a method named C2RS meaning "a real-time correlation of host-level events in cyber range service."  ...  Cyber range is an adaptable virtualization platform consisting of computers, networks, and systems on which various real-world cyber threat scenarios and systems can be evaluated to provide a comprehensive  ...  A cyber range is generally defined as a virtual environment that is used for cyberwarfare training and cyber technology development.  ... 
doi:10.1109/access.2018.2846590 fatcat:p6w54x4xyvdnbgxdlclu45hfxe

Lessons learned from complex hands-on defence exercises in a cyber range

Jan Vykopal, Martin Vizvary, Radek Oslejsek, Pavel Celeda, Daniel Tovarnak
2017 2017 IEEE Frontiers in Education Conference (FIE)  
Knowledge and skills required for cyber defence can be developed and exercised by lectures and lab sessions, or by active learning, which is seen as a promising and attractive alternative.  ...  In this paper, we present experience gained from the preparation and execution of cyber defence exercises involving various participants in a cyber range. The exercises follow a Red vs.  ...  The Cyber Czech exercise series was designed, developed and carried out in cooperation with the National Cyber Security Centre (NCSC), a part of the National Security Authority of the Czech Republic.  ... 
doi:10.1109/fie.2017.8190713 dblp:conf/fie/VykopalVOCT17 fatcat:uzgd5yxe6fdenfrgbrtqeuzbwu

Cyber Ranges and TestBeds for Education, Training, and Research

Nestoras Chouliaras, George Kittes, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, Mohamed Amine Ferrag
2021 Applied Sciences  
The purpose of the interview is to find details about essential components, and especially the tools used to design, create, implement and operate a Cyber Range platform, and to present the findings.  ...  In this paper, we conduct a systematic survey of ten Cyber Ranges that were developed in the last decade, with a structured interview.  ...  Additionally, there are three Services models of Cloud Computing: Infrastructure, Software, and Platform as a Service (IaaS, SaaS, PaaS).  ... 
doi:10.3390/app11041809 fatcat:yzl7tj5rofepvh7ubv5qfb2rne

Facebook's Cyber–Cyber and Cyber–Physical Digital Twins

John Ahlgren, Kinga Bojarczuk, Sophia Drossopoulou, Inna Dvortsova, Johann George, Natalija Gucevska, Mark Harman, Maria Lomeli, Simon M. M. Lucas, Erik Meijer, Steve Omohundro, Rubmary Rojas (+2 others)
2021 Evaluation and Assessment in Software Engineering  
As we shall see, these apparently philosophical observations have practical ramifications for the design, implementation and deployment of digital twins at Facebook.  ...  A cyber-cyber digital twin is a simulation of a software system. By contrast, a cyber-physical digital twin is a simulation of a nonsoftware (physical) system.  ...  The environment service can be (re)implemented for different platforms or as a synthetic environment, where all actions are executed offline.  ... 
doi:10.1145/3463274.3463275 fatcat:tx6bsam52jbofpxp5se34borni
« Previous Showing results 1 — 15 out of 26,924 results