On-demand Deployment and Orchestration of Cyber Ranges in the Cloud

In this paper we present a framework for the dynamic deployment, configuration and orchestration of cyber ranges in a cloud-based environment. We propose a distributed architecture that is composed of a number of interacting components, each looking after a specific facet of the integrated set of requirements coming out of the design phase. The architecture in question is indeed capable of offering environment isolation, remote access management and control, procedures automation, secure operation and accountability. A formal description of the concept of a cyber range is provided in the paper, together with a taxonomy associated with the different kinds of resources it can involve. A complete implementation of the proposed framework through Amazon Web Services is also illustrated, so to help the reader figure out how the overall design can be easily mapped onto a specific provider of cloud resources.

[1]  Zhiyu Chen,et al.  Design of Information System Cyber Security Range Test System for Power Industry , 2019, 2019 IEEE Innovative Smart Grid Technologies - Asia (ISGT Asia).

[2]  Simon Pietro Romano,et al.  The Docker Security Playground: A hands-on approach to the study of network security , 2017, 2017 Principles, Systems and Applications of IP Telecommunications (IPTComm).

[3]  Tero Kokkonen,et al.  Comprehensive Cyber Arena; The Next Generation Cyber Range , 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[4]  Timea Pahi,et al.  Design Considerations for Cyber Security Testbeds: A Case Study on a Cyber Security Testbed for Education , 2017, 2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech).

[5]  Basel Katt,et al.  EXCON Teams in Cyber Security Training , 2019, 2019 International Conference on Computational Science and Computational Intelligence (CSCI).

[6]  Han Lin,et al.  Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper , 2018, 2018 International Carnahan Conference on Security Technology (ICCST).

[7]  P. Alam ‘T’ , 2021, Composites Engineering: An A–Z Guide.

[8]  Wim Mees,et al.  Building a Cyber Range for training CyberDefense Situation Awareness , 2019, 2019 International Conference on Military Communications and Information Systems (ICMCIS).

[9]  P. Alam ‘W’ , 2021, Composites Engineering.