Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Survey of Cyber Range: Current Status, Analysis, and Future Trends

  • Conference paper
  • First Online:
Network Simulation and Evaluation (NSE 2023)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 2064))

Included in the following conference series:

  • 83 Accesses

Abstract

The escalating threats in the realm of cybersecurity have given rise to the demand for security assessments of information systems. However, due to the limitations of freely and continuously conducting real-time security tests on actual systems, the need for simulation-based evaluation arises, leading to the emergence of network cyber range technology. In recent years, network cyber ranges have evolved into pivotal scientific infrastructures supporting the construction of national cybersecurity strategies. They are rapidly becoming the digital innovation frontier for countries and organizations such as the United States, the European Union, and Japan. These cyber ranges effectively support a range of activities in the field of cybersecurity, including security technology research, red team-blue team exercises, security capability evaluations, and validation of emerging network technologies. In this paper, we collect, consolidate, and summarize existing cyber ranges, analyze their core technologies, key functionalities, and classical applications. Furthermore, we provide an overview of the current state of cyber range technology and shed light on its shortcomings and future development trends.

Supported by organization x.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Peng Cheng Cyber Range (CSR). https://public.cyber.mil/knowledge-base/cybersecurity-range/

  2. Christos, X., Ioannis, Z., Charalambos, K., Alireza, J., Muhammad, K.K., Kim-Kwang, R.C., et al.: Consumer, commercial, and industrial IoT (in)security: attack taxonomy and case studies. IEEE Internet Things J. 9(1), 199–221 (2022)

    Article  Google Scholar 

  3. Francesca, M., Matteo, C., Daniel, Z., Michele, P., Andrea, Z., et al.: IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182–8201 (2019)

    Article  Google Scholar 

  4. Nystad, E., Katta, V., Simensen, J.E.: What happens in a control room during a cybersecurity attack? Preliminary observations from a pilot study. In: International Conference on Software Engineering, pp. 270–275 (2020)

    Google Scholar 

  5. Yunhui, Z., Yunsik, C., Shu, H., Alvin, C.M.L., Gene, M.L., Andrew, B.W., et al.: Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia. J. Manag. Inf. Syst. 37(3), 668–693 (2020)

    Article  Google Scholar 

  6. Chen, B., Wang, X., Zhang, W., et al.: Public opinion dynamics in cyberspace on Russia-Ukraine war: a case analysis with Chinese Weibo. IEEE Trans. Comput. Soc. Syst. 9(3), 948–958 (2022)

    Article  Google Scholar 

  7. Singh, G., Acharya, H.B.: POSTER: a cyberspace study of the Russia-Ukraine war. In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, pp. 1016–1018 (2023)

    Google Scholar 

  8. Unwala, A., Ghori, S.: Brandishing the cybered bear: information war and the Russia-Ukraine conflict. Mil. Cyber Aff. 1(1), 7 (2016)

    Google Scholar 

  9. Willett, M.: The cyber dimension of the Russia–Ukraine war. In: Survival: October–November 2022, pp. 7–26. Routledge (2023)

    Google Scholar 

  10. National Cyber Range (NCR) - PEO STRI. https://www.peostri.army.mil/national-cyber-range-ncr

  11. NPS gains access to IJoint Information Operations Range. https://www.navy.mil/Press-Office/News-Stories/Article/2871330/nps-gains-access-to-joint-information-operations-range/

  12. Cybersecurity Range (CSR). https://public.cyber.mil/knowledge-base/cybersecurity-range/

  13. Defense Advanced Research Projects Agency (DARPA). National Cyber Range (NCR). https://www.darpa.mil/program/national-cyber-range

  14. European Cybersecurity Competence Center (ECCC). European Commission. https://digital-strategy.ec.europa.eu/en/policies/european-cybersecurity-competence-centre-and-network

  15. National Institute of Information and Communications Technology (NICT). Cyber Range Training Center. https://www2.nict.go.jp/cs4htrs/en/activities/crtc/

  16. LNCS Homepage. http://www.springer.com/lncs. Last accessed 4 Oct 2017

  17. NATO Cyber Range. https://youtu.be/g_m_CKSV7aU

  18. U.S. National Cyber Range (NCR). https://www.peostri.army.mil/national-cyber-range-ncr

  19. U.S. Joint Information Operations Range (JIOR). https://www.secrss.com/articles/3855. https://www.navy.mil/Press-Office/News-Stories/Article/2871330/nps-gains-access-to-joint-information-operations-range/

  20. U.S. DoD Cyber Security Range (IAR/CSR). https://public.cyber.mil/knowledge-base/cybersecurity-range/

  21. DoD Enterprise Network Range Environment (DECRE). https://www.secrss.com/articles/3855

  22. US Air Force CyberSpace Training Range (SIMTEX). https://cloud.tencent.com/developer/article/1538944

  23. CAAJED. https://apps.dtic.mil/sti/pdfs/ADA481288.pdf

  24. SAST. https://www.pnnl.gov/main/publications/external/technicalreports/pnnl-18964.pdf

  25. StealthNet. https://ieeexplore.ieee.org/abstract/document/6127499/

  26. UK Commonwealth Cyber Range. https://www.northropgrumman.com/cyber/

  27. Concordia Consortium. https://www.concordia-h2020.eu/consortiuml

  28. CD TEXP. https://eda.europa.eu/news-and-events/news/2022/05/25/eda-developed-cyber-training-platform-handt

  29. NATO Cyber Range. https://www.cr14.ee/ranges/#open-cyber-range

  30. Swedish Cyber Range and Training Environment (Cyber Range and Training Environment CRATE). https://www.foi.se/en/foi/research/information-security/crate---swedens-national-cyber-training-facility

  31. StarBED. https://starbed.nict.go.jp/en/

  32. Guiyang Big Data Security Range. https://www.secrss.com/articles/47817

  33. Cisco Cyber Security Range. https://www.cisco.com/

  34. Circadence. https://circadence.com/

  35. Simpace. https://www.simspace.com/

  36. Circadence-Project Ares. https://circadence.com/

  37. Cyrin. https://cyrin.atcorp.com/

  38. U.S. Cyber Range. https://www.uscyberrange.org/

  39. Field Effect. https://fieldeffect.com/products/cyber-range-security-training

  40. Company - Real Network Security Range Platform. https://360.net/product-center/360-target-platform/new-gen

  41. NSFOCUS - Network Space Security Simulation Platform. https://www.nsfocus.com.cn/html/2020/21 0925/663.html

  42. Yongxin Zhicheng - Chunqiu Yunjing Network Range Platform. http://www.stcn.com/article/detail/703436.html

  43. Cyberbit. “https://www.cyberbit.com/platform/cyber-rangel

  44. keysight- Ixia -Breakingpoint Range. https://www.keysight.com/us/en/products/network-security/breakingpoint.html

  45. Silensec-CYBER RANGES. https://www.cyberranges.com/

  46. DIATEAMHNS Platform. https://www.diateam.net/

  47. CybExer Technologies-Cybexer. https://cybexer.com/

  48. CYROP. https://cn-sec.com/archives/1381902.html

  49. SECUSIM. https://link.springercom/chapter/10.1007/3-540-45600-753

  50. RINSE. https://www.researchgate.net/publication/221117904_RINSE_The_Real-Time_Immersive_Network_Simi

  51. OPNFT Cyber Range. https://opnetprojects.com/

  52. VCSTC. https://ieeexplore.ieee.org/abstract/document/4534480

  53. Emulab. https://www.usenix.org/legacy/event/cset10/tech/fullpapers/Cutler.pdf

  54. DETER. https://web.archive.org/web/20170809104516id. http://www.deter-project.org/sites/default/files/photos

  55. Virginia Cyber Range. https://it.vt.edu/administration/units/virginiacyberrange.htm

  56. NetEngine. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=b989f8f4c5644354c1c8dee4de8380

  57. The introduction of CD_TEXP. https://academiamilitar.pt/images/4NATO/CD_TEXP_Presentation_18APR18_pd

  58. The introduction of NATO. https://youtu.be/g_m_CKSV7aU

Download references

Acknowledgements

This research was funded by the Major Key Project of PCL (Grant No. PCL2022A03-3), NSFC (No. 62072131, 61972106).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Weihong Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, J., Li, Z., Chen, R., Han, W., Hu, N., Zhang, Y. (2024). A Survey of Cyber Range: Current Status, Analysis, and Future Trends. In: Gu, Z., Zhou, W., Zhang, J., Xu, G., Jia, Y. (eds) Network Simulation and Evaluation. NSE 2023. Communications in Computer and Information Science, vol 2064. Springer, Singapore. https://doi.org/10.1007/978-981-97-4522-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-981-97-4522-7_6

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-97-4521-0

  • Online ISBN: 978-981-97-4522-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics