Proceedings of the 12th International Conference on Software Technologies 2017
DOI: 10.5220/0006428203100321
|View full text |Cite
|
Sign up to set email alerts
|

KYPO Cyber Range: Design and Use Cases

Abstract: Abstract:The physical and cyber worlds are increasingly intertwined and exposed to cyber attacks. The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully controlled and monitored environment. Time-efficient and cost-effective deployment is feasible using cloud resources instead of a dedicated hardware infrastructure. This paper describes the design decisions made during it's development. We prepared a set of use cases to evaluate the proposed design decisions and to demonstrate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 67 publications
(42 citation statements)
references
References 12 publications
0
41
0
1
Order By: Relevance
“…The low-level hypotheses were obtained from discussions with six domain experts (three of them are co-authors of this paper), each with more than six years of experience with organizing CTFs and CDXs. The final classification hierarchy was reached by consensus of the authors whose expertise includes cyber training design and organization as well as the design of analytical visualizations for KYPO Cyber Range [7]. The rest of this section is structured according to the proposed scheme as follows.…”
Section: Visualizations and Hypothesesmentioning
confidence: 99%
See 1 more Smart Citation
“…The low-level hypotheses were obtained from discussions with six domain experts (three of them are co-authors of this paper), each with more than six years of experience with organizing CTFs and CDXs. The final classification hierarchy was reached by consensus of the authors whose expertise includes cyber training design and organization as well as the design of analytical visualizations for KYPO Cyber Range [7]. The rest of this section is structured according to the proposed scheme as follows.…”
Section: Visualizations and Hypothesesmentioning
confidence: 99%
“…The KYPO Cyber Range [7] is a highly flexible and scalable cloud-based platform. Its core functionality is to emulate computer networks with full-fledged operating systems and network devices that mimic real-world systems.…”
Section: Training Life Cycles and Data In Kypomentioning
confidence: 99%
“…While this skill can be exercised in Capture the Flag games, challenges, and competitions, our courses introduce an innovative approach. The learners are guided to create a serious security game deployed at the KYPO cyber range [19], which allows emulating real threats and attacks in a controlled environment.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, participants can realistically interact with an assigned host or network infrastructure, and their actions cannot interfere with the operational environment. The following text describes a high-level view of the architecture of the KYPO [26] cyber range, which we use in the Cyber Czech exercise. Sandboxes represent a low-level layer of the cyber range.…”
Section: A Cyber Range Infrastructurementioning
confidence: 99%
“…One very popular cyber range is DETER/DeterLab [20], [21], which is based on Emulab and was started with the goal of advancing cyber security research and education in 2004. Nowadays, there exist many other cyber ranges, e. g., National Cyber Range (NCR) [22], Michigan Cyber Range (MCR) [23], SimSpace Cyber Range [24], EDURange [25], or KYPO Cyber Range [26].…”
Section: Cyber Rangesmentioning
confidence: 99%