2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C) 2019
DOI: 10.1109/qrs-c.2019.00082
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Cyber Security Experimentation Platform Architecture Based on Docker

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…In 2019, Yin, et al, [20] present a new architecture for a cyber security experimentation platform on the basis of Docker. This software has the scalability and flexibility necessary for large-scale cyber simulations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In 2019, Yin, et al, [20] present a new architecture for a cyber security experimentation platform on the basis of Docker. This software has the scalability and flexibility necessary for large-scale cyber simulations.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Here, we present a subset of previous works that are the most relevant to the PocketCTF approach. The idea of using LXC containers or Dockers instead of virtual machines for CTF labs has been under research over the last few years [11,30]. More specifically, Irvine et al introduced a framework for parameterizing cybersecurity labs by using Docker containers instead of virtualization technologies [24].…”
Section: Related Workmentioning
confidence: 99%
“…Moreover, the benefits of virtualization and Dockers have also been considered by analyzing their capabilities for network virtualization [46,47]. The networking functionalities of containerization technology in the content of lightweight virtualization instances have been under research [30,48]. Finally, the capabilities of cyber ranges to use virtualization technologies to easily recover or to reproduce laboratory scenarios have been also studied [49].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this method, various experimental environments and network topologies with flexible monitoring and faster test environment has been deployed for larger cyber simulation. Additional functions of cyber security have been further improved by using the proposed method [21].…”
Section: Literature Surveymentioning
confidence: 99%