Abstract
The escalating threats in the realm of cybersecurity have given rise to the demand for security assessments of information systems. However, due to the limitations of freely and continuously conducting real-time security tests on actual systems, the need for simulation-based evaluation arises, leading to the emergence of network cyber range technology. In recent years, network cyber ranges have evolved into pivotal scientific infrastructures supporting the construction of national cybersecurity strategies. They are rapidly becoming the digital innovation frontier for countries and organizations such as the United States, the European Union, and Japan. These cyber ranges effectively support a range of activities in the field of cybersecurity, including security technology research, red team-blue team exercises, security capability evaluations, and validation of emerging network technologies. In this paper, we collect, consolidate, and summarize existing cyber ranges, analyze their core technologies, key functionalities, and classical applications. Furthermore, we provide an overview of the current state of cyber range technology and shed light on its shortcomings and future development trends.
Supported by organization x.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Peng Cheng Cyber Range (CSR). https://public.cyber.mil/knowledge-base/cybersecurity-range/
Christos, X., Ioannis, Z., Charalambos, K., Alireza, J., Muhammad, K.K., Kim-Kwang, R.C., et al.: Consumer, commercial, and industrial IoT (in)security: attack taxonomy and case studies. IEEE Internet Things J. 9(1), 199–221 (2022)
Francesca, M., Matteo, C., Daniel, Z., Michele, P., Andrea, Z., et al.: IoT: internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet Things J. 6(5), 8182–8201 (2019)
Nystad, E., Katta, V., Simensen, J.E.: What happens in a control room during a cybersecurity attack? Preliminary observations from a pilot study. In: International Conference on Software Engineering, pp. 270–275 (2020)
Yunhui, Z., Yunsik, C., Shu, H., Alvin, C.M.L., Gene, M.L., Andrew, B.W., et al.: Understanding security vulnerability awareness, firm incentives, and ICT development in Pan-Asia. J. Manag. Inf. Syst. 37(3), 668–693 (2020)
Chen, B., Wang, X., Zhang, W., et al.: Public opinion dynamics in cyberspace on Russia-Ukraine war: a case analysis with Chinese Weibo. IEEE Trans. Comput. Soc. Syst. 9(3), 948–958 (2022)
Singh, G., Acharya, H.B.: POSTER: a cyberspace study of the Russia-Ukraine war. In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, pp. 1016–1018 (2023)
Unwala, A., Ghori, S.: Brandishing the cybered bear: information war and the Russia-Ukraine conflict. Mil. Cyber Aff. 1(1), 7 (2016)
Willett, M.: The cyber dimension of the Russia–Ukraine war. In: Survival: October–November 2022, pp. 7–26. Routledge (2023)
National Cyber Range (NCR) - PEO STRI. https://www.peostri.army.mil/national-cyber-range-ncr
NPS gains access to IJoint Information Operations Range. https://www.navy.mil/Press-Office/News-Stories/Article/2871330/nps-gains-access-to-joint-information-operations-range/
Cybersecurity Range (CSR). https://public.cyber.mil/knowledge-base/cybersecurity-range/
Defense Advanced Research Projects Agency (DARPA). National Cyber Range (NCR). https://www.darpa.mil/program/national-cyber-range
European Cybersecurity Competence Center (ECCC). European Commission. https://digital-strategy.ec.europa.eu/en/policies/european-cybersecurity-competence-centre-and-network
National Institute of Information and Communications Technology (NICT). Cyber Range Training Center. https://www2.nict.go.jp/cs4htrs/en/activities/crtc/
LNCS Homepage. http://www.springer.com/lncs. Last accessed 4 Oct 2017
NATO Cyber Range. https://youtu.be/g_m_CKSV7aU
U.S. National Cyber Range (NCR). https://www.peostri.army.mil/national-cyber-range-ncr
U.S. Joint Information Operations Range (JIOR). https://www.secrss.com/articles/3855. https://www.navy.mil/Press-Office/News-Stories/Article/2871330/nps-gains-access-to-joint-information-operations-range/
U.S. DoD Cyber Security Range (IAR/CSR). https://public.cyber.mil/knowledge-base/cybersecurity-range/
DoD Enterprise Network Range Environment (DECRE). https://www.secrss.com/articles/3855
US Air Force CyberSpace Training Range (SIMTEX). https://cloud.tencent.com/developer/article/1538944
SAST. https://www.pnnl.gov/main/publications/external/technicalreports/pnnl-18964.pdf
StealthNet. https://ieeexplore.ieee.org/abstract/document/6127499/
UK Commonwealth Cyber Range. https://www.northropgrumman.com/cyber/
Concordia Consortium. https://www.concordia-h2020.eu/consortiuml
CD TEXP. https://eda.europa.eu/news-and-events/news/2022/05/25/eda-developed-cyber-training-platform-handt
NATO Cyber Range. https://www.cr14.ee/ranges/#open-cyber-range
Swedish Cyber Range and Training Environment (Cyber Range and Training Environment CRATE). https://www.foi.se/en/foi/research/information-security/crate---swedens-national-cyber-training-facility
StarBED. https://starbed.nict.go.jp/en/
Guiyang Big Data Security Range. https://www.secrss.com/articles/47817
Cisco Cyber Security Range. https://www.cisco.com/
Circadence. https://circadence.com/
Simpace. https://www.simspace.com/
Circadence-Project Ares. https://circadence.com/
Cyrin. https://cyrin.atcorp.com/
U.S. Cyber Range. https://www.uscyberrange.org/
Field Effect. https://fieldeffect.com/products/cyber-range-security-training
Company - Real Network Security Range Platform. https://360.net/product-center/360-target-platform/new-gen
NSFOCUS - Network Space Security Simulation Platform. https://www.nsfocus.com.cn/html/2020/21 0925/663.html
Yongxin Zhicheng - Chunqiu Yunjing Network Range Platform. http://www.stcn.com/article/detail/703436.html
Cyberbit. “https://www.cyberbit.com/platform/cyber-rangel”
keysight- Ixia -Breakingpoint Range. https://www.keysight.com/us/en/products/network-security/breakingpoint.html
Silensec-CYBER RANGES. https://www.cyberranges.com/
DIATEAMHNS Platform. https://www.diateam.net/
CybExer Technologies-Cybexer. https://cybexer.com/
SECUSIM. https://link.springercom/chapter/10.1007/3-540-45600-753
RINSE. https://www.researchgate.net/publication/221117904_RINSE_The_Real-Time_Immersive_Network_Simi
OPNFT Cyber Range. https://opnetprojects.com/
VCSTC. https://ieeexplore.ieee.org/abstract/document/4534480
Emulab. https://www.usenix.org/legacy/event/cset10/tech/fullpapers/Cutler.pdf
DETER. https://web.archive.org/web/20170809104516id. http://www.deter-project.org/sites/default/files/photos
Virginia Cyber Range. https://it.vt.edu/administration/units/virginiacyberrange.htm
NetEngine. https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=b989f8f4c5644354c1c8dee4de8380
The introduction of CD_TEXP. https://academiamilitar.pt/images/4NATO/CD_TEXP_Presentation_18APR18_pd
The introduction of NATO. https://youtu.be/g_m_CKSV7aU
Acknowledgements
This research was funded by the Major Key Project of PCL (Grant No. PCL2022A03-3), NSFC (No. 62072131, 61972106).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zhang, J., Li, Z., Chen, R., Han, W., Hu, N., Zhang, Y. (2024). A Survey of Cyber Range: Current Status, Analysis, and Future Trends. In: Gu, Z., Zhou, W., Zhang, J., Xu, G., Jia, Y. (eds) Network Simulation and Evaluation. NSE 2023. Communications in Computer and Information Science, vol 2064. Springer, Singapore. https://doi.org/10.1007/978-981-97-4522-7_6
Download citation
DOI: https://doi.org/10.1007/978-981-97-4522-7_6
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-4521-0
Online ISBN: 978-981-97-4522-7
eBook Packages: Computer ScienceComputer Science (R0)