Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3314058.3317727acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster

Design for an educational cyber range

Published: 01 April 2019 Publication History

Abstract

The "Cyber Range" concept arose as a method for organizations to provide realistic training in penetration testing and incident response. These ranges often utilize virtualization to reduce cost and allow for rapid reconfiguration. However, virtualization management software is often expensive or difficult to install. This paper presents a management application using open-source software with the intent of allowing educators to rapidly create virtual ranges at minimal cost.

References

[1]
{n. d.}. Build the future of Open Infrastructure, https://www.openstack.org/
[2]
{n. d.}. ESXi | Bare Metal Hypervisor. https://www.vmware.com/products/esxi-and-esx.html
[3]
{n. d.}. libvirt: The virtualization API. https://libvirt.org/index.html
[4]
{n. d.}. Proxmox - powerful open-source server solutions. https://www.proxmox.com/en/
[5]
2018. Cyber Ranges, https://www.nist.gov/sites/default/files/documents/2018/02/13/cyber_ranges.pdf
[6]
Roy Thomas Fielding. 2000. Architectural styles and the design of network-based software architectures. University of California, Irvine, http://dl.acm.org/citation.cfm?id=932295
[7]
Paul Hernandez. 2018. New Data Show Demand for Cybersecurity Professionals Accelerating. https://www.nist.gov/news-events/news/2018/11/new-data-show-demand-cybersecurity-professionals-accelerating
[8]
K. Duda P. Agarwal L. Kreeger T. Sridhar M. Bursell C. Wright M. Mahalingam, D. Dutt. 2014. Virtual extensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks, https://www.rfc-editor.org/rfc/pdfrfc/rfc7348.txt.pdf

Cited By

View all
  • (2022)Gamification of cyber ranges in cybersecurity education2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)10.1109/ICETA57911.2022.9974714(280-285)Online publication date: 20-Oct-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
HotSoS '19: Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security
April 2019
149 pages
ISBN:9781450371476
DOI:10.1145/3314058
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • National Security Agency: National Security Agency

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 April 2019

Check for updates

Author Tags

  1. cyber range
  2. education
  3. software defined networking
  4. training
  5. virtualization

Qualifiers

  • Poster

Conference

HotSoS
Sponsor:
  • National Security Agency
HotSoS: Hot Topics in the Science of Security Symposium
April 1 - 3, 2019
Tennessee, Nashville, USA

Acceptance Rates

Overall Acceptance Rate 34 of 60 submissions, 57%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)30
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Gamification of cyber ranges in cybersecurity education2022 20th International Conference on Emerging eLearning Technologies and Applications (ICETA)10.1109/ICETA57911.2022.9974714(280-285)Online publication date: 20-Oct-2022

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media