9,161 Hits in 4.4 sec

Realistic simulation of users for IT systems in cyber ranges [article]

Alexandre Dey, Benjamin Costé, Éric Totel, Adrien Bécue
2021 arXiv   pre-print
Generating user activity is a key capability for both evaluating security monitoring tools as well as improving the credibility of attacker analysis platforms (e.g., honeynets).  ...  In this paper, to generate this activity, we instrument each machine by means of an external agent.  ...  Appelées communément Cyber Ranges, ces plateformes facilitent le déploiement de Systèmes d'Information (SI) complets pour l'organisation de formations et exercices à destination des opérationnels de cyberdéfense  ... 
arXiv:2111.11785v1 fatcat:fz7dpgpgcvfgtm3ky6deqinxfu

A Cyber Range for Armed Forces Education

Michal Turčaník
2020 Information & Security An International Journal  
Cyber range for educational purposes in the armed forces has been proposed taking into account the important parameters a cyber range should incorporate.  ...  Cybersecurity awareness and cyber security training are promoted by hyper-realistic virtual environments termed as cyber ranges. This article highlights the concept of a cyber range.  ...  This kind of cyber range is especially useful for cyber training of physical systems, such as embedded or industrial systems.  ... 
doi:10.11610/isij.4622 fatcat:nyyq3dw42bfupecjjtabkbm42y

Implementation of Federated Cyber Ranges in Bulgarian Universities: Challenges, Requirements, and Opportunities

Elitsa Pavlova
2021 Information & Security An International Journal  
Hyper-realistic virtual environments called cyber ranges help increase the level of cybersecurity training.  ...  A systematic review of the modern cyber ranges used for teaching and research purposes in higher education institutions has been made.  ...  Acknowledgements This publication is supported by the University of National and World Economy's research grant UNWE NID NI 24/2021.  ... 
doi:10.11610/isij.5006 fatcat:lotx4vnzhba4noie5iy2sfb4ea

A next-generation platform for Cyber Range-as-a-Service [article]

Vittorio Orbinato
2021 arXiv   pre-print
Cloud computing plays a key role in this context since it enables the creation of virtual infrastructures on which Cyber Ranges are based.  ...  However, the setup and management of Cyber Ranges are expensive and time-consuming activities. In this paper, we highlight the novel features for the next-generation Cyber Range platforms.  ...  This work has been partially supported by the Italian Ministry of University and Research (MUR) under the programme "PON Ricerca e Innovazione 2014-2020 -Dottorati innovativi con caratterizzazione industriale  ... 
arXiv:2112.11233v1 fatcat:hercjvwlkzgybay737edulu6ja

Assessing the effectiveness of cybersecurity training and raising awareness within the maritime domain

Monica Canepa, Fabio Ballini, Dimitrios Dalaklis, Seyedvahid Vakili
2021 Zenodo  
The Cyber-MAR Project is focused on hyper-realistic simulation and emulation of maritime systems (e.g.  ...  Supply Chain) and aims to create a federated Cyber Range (CR Cyber-MAR) which will include various platforms and interconnected systems onboard a ship or on land, in order to facilitate a real-time simulation  ...  A simulation environment is a representation of an organization's ICT, OT, mobile and physical systems, applications and infrastructures [7] It , includes the simulation of attacks, of users and of their  ... 
doi:10.5281/zenodo.5101534 fatcat:zx3kjr7ecvdc5cmtcjnmehspt4

The design and implementation of a network simulation platform

S. von Solms, S. W. Peach
2013 2013 International Conference on Adaptive Science and Technology  
In this paper we present the design of a network simulation platform which can enable researchers to study dynamic behaviour of networks, network protocols, and emerging classes of distributed applications  ...  The use of a network simulation environment that can realistically replicate these events and their effects can enable researchers to identify these threats and find ways to counter them.  ...  Boeing Intelligence and Security Systems developed a Cyber Range-in-a-Box (CRIAB) [6] for the modelling and simulation of cyber threats to develop security solutions.  ... 
doi:10.1109/icastech.2013.6707514 fatcat:qmpgzjxsajewfi3uoxc2kouh3y

Multimodal Gumdo Game: The Whole Body Interaction with an Intelligent Cyber Fencer [chapter]

Jungwon Yoon, Sehwan Kim, Jeha Ryu, Woontack Woo
2002 Lecture Notes in Computer Science  
This paper presents an immersive multimodal Gumdo simulation game that allows a user to experience the whole body interaction with an intelligent cyber fencer.  ...  Secondly, an intelligent cyber fencer provides the user with intelligent interactions by perception and reaction modules that are created by the analysis of real Gumdo game.  ...  Table 1 shows system specifications of the Gumdo simulation game. The movement range is 2m x 4m and the resolution of the vision system is 5cm/disparity in the range of 3-5m.  ... 
doi:10.1007/3-540-36228-2_135 fatcat:wfs26mytnfayrmhnieeerndneu

Cyber Ranges and TestBeds for Education, Training, and Research

Nestoras Chouliaras, George Kittes, Ioanna Kantzavelou, Leandros Maglaras, Grammati Pantziou, Mohamed Amine Ferrag
2021 Applied Sciences  
In this paper, we conduct a systematic survey of ten Cyber Ranges that were developed in the last decade, with a structured interview.  ...  The purpose of the interview is to find details about essential components, and especially the tools used to design, create, implement and operate a Cyber Range platform, and to present the findings.  ...  Therefore, it would be better organized, and also modular and in effect realistic, if multiple cyber ranges, each within a specific area of expertise, could collaborate in order to offer to their users  ... 
doi:10.3390/app11041809 fatcat:yzl7tj5rofepvh7ubv5qfb2rne

Facebook's Cyber–Cyber and Cyber–Physical Digital Twins

John Ahlgren, Kinga Bojarczuk, Sophia Drossopoulou, Inna Dvortsova, Johann George, Natalija Gucevska, Mark Harman, Maria Lomeli, Simon M. M. Lucas, Erik Meijer, Steve Omohundro, Rubmary Rojas (+2 others)
2021 Evaluation and Assessment in Software Engineering  
A cyber-cyber digital twin is a simulation of a software system. By contrast, a cyber-physical digital twin is a simulation of a nonsoftware (physical) system.  ...  In this paper we show how the unique properties of cyber-cyber digital twins open up exciting opportunities for research and development.  ...  When a bot has a range of decisions available to it, it uses the imitation learner in order to determine the next step.  ... 
doi:10.1145/3463274.3463275 fatcat:tx6bsam52jbofpxp5se34borni

A System-of-Systems Approach for the Creation of a Composite Cyber Range for Cyber/Hybrid Exercising

George Sharkov, Christina Todorova, Georgi Koykov, Georgi Zahariev
2021 Information & Security An International Journal  
Acknowledgements The authors would like to express their sincere gratitude to the British Embassy in Sofia and the Sofia Tech Park for their continuous support and trust for the GB-BG Cyber Shockwave series  ...  of exercises.  ...  This type of cyber range is based on the concept of recreating a given environment based on the realistic usage of its components.  ... 
doi:10.11610/isij.5029 fatcat:xn3itk4vkfab5m3ypz7bsnccue

The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment

Olivier Jacq, Pablo Gimenez Salazar, Kamban Parasuraman, Jarkko Kuusijarvi, Andriana Gkaniatsou, Evangelia Latsa, Angelos Amditis
2021 Zenodo  
In this paper, we present the capabilities of a high-end hybrid cyber range for port cyber risks awareness and training.  ...  By describing a specific port use-case and the first results achieved, we draw perspectives for the use of cyber ranges for the training of port actors in cyber crisis management.  ...  The authors would like to thank all participants of the Cyber-MAR H2020 project for their continuous and rich involvement in the specification and realization of this port CR use-case.  ... 
doi:10.5281/zenodo.5236127 fatcat:uusnycw4ovfuta4zmrtbm7bhy4

The Use of Cyber Ranges in the Maritime Context

Kimberly Tam, Kemedi Moara-Nkwe, Kevin Jones
2020 Maritime Technology and Research  
While there are already many sectors employing this strategy (e.g., space, smart buildings, business IT) maritime has yet to take advantage of the available cyber-range technology to assess cyber-risks  ...  Conducting training programmes for both requires dedicated computing infrastructure to simulate and execute effective scenarios for both sets of trainees.  ...  Content reflects only the authors' views, and the European Commission is not responsible for any use that may be made of the information it contains.  ... 
doi:10.33175/mtr.2021.241410 fatcat:3qpeufgapzeplhrd4avkm6xksi

KYPO Cyber Range: Design and Use Cases

Jan Vykopal, Radek Oslejsek, Pavel Celeda, Martin Vizvary, Daniel Tovarnak
2017 Proceedings of the 12th International Conference on Software Technologies  
The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully controlled and monitored environment.  ...  It was especially cyber training sessions and exercises with hundreds of participants which provided invaluable feedback for KYPO platform development.  ...  Our current work focuses on research into tools for more realistic, economical, and time efficient simulations of real cyber entities.  ... 
doi:10.5220/0006428203100321 dblp:conf/icsoft/VykopalOCVT17 fatcat:lb4stzpftrecvjchqog2oty6r4

D2.1: State of the art cyber range technologies analysis

Marc Lamotte
2020 Zenodo  
An evaluation platform and system of the Cyber Range is mandatory in order to guarantee reliability of the simulation results in return.  ...  The Cyber Ranges (CRs) are virtual simulation environments for networks with the capability to incorporate elements like simulated devices, simulated traffics, and others.  ...  While it is providing an easy-to-setup environment, it does not fit directly for a user that wants to run a local setup of their environment in the cyber range.  ... 
doi:10.5281/zenodo.5036265 fatcat:w7hzszitsfe7ji5b4nmwg27q64

Building a Virtual Maritime Logistics Cybersecurity Training Platform

Harri Pyykkö, Jarkko Kuusijärvi, Sami Noponen, Sirra Toivonen, Ville Hinkka
2020 Zenodo  
Purpose: This paper proposes how cyber ranges, which are simulation environments and platforms, can be used for cybersecurity training to reduce the vulnerability surface of the maritime supply chain caused  ...  Methodology: This study aims to create a holistic model for a cyber range training environment customized for the port/maritime logistics sector by simulating the actual operational environment.  ...  How to adjust cyber range simulations for the maritime cyber domain The knowledge of how to build the specific modules used in a scenario is heavily based on the user and operational requirements.  ... 
doi:10.5281/zenodo.4646995 fatcat:r5xoecqiczffzd4ec7xmpu4qmu
« Previous Showing results 1 — 15 out of 9,161 results