Exploring the Architectural Composition of Cyber Ranges: A Systematic Review
Abstract
:1. Introduction
2. Methodology
2.1. Inclusion Process and Eligibility Criteria
2.2. Information Sources
2.3. Search Strategy
2.4. Selection Process
2.5. Data Items
3. Results
3.1. Study Selection
3.2. Synthesis of Results
- Used various design developments covering a wide range of technologies, methods, functionality, and heterogeneous objectives, each within a specific domain of expertise (e.g., CPSs and ITNs) [16].
4. Discussion
4.1. General Interpretation of the Literature Findings
4.1.1. Target Group
4.1.2. Sector
4.1.3. Domain of Application
4.1.4. Technology
4.1.5. Geolocation
4.1.6. Scenario Mechanism
4.2. Challenges in the Literature Findings
4.3. Future Research Directions
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Campbell, J. The AI Threat Landscape: Tech Companies and Governments Must Unite Behind Cybersecurity in 2024. Cisco Blogs. Government Affairs and Public Policy. 2024. Available online: https://blogs.cisco.com/news/the-ai-threat-landscape-tech-companies-and-governments-must-unite-behind-cybersecurity-in-2024 (accessed on 25 November 2023).
- Samonas, S.; Coss, D. The CIA strikes back: Redefining Confidentiality, Integrity and Availability in security. J. Inf. Syst. Secur. 2014, 10, 21–45. Available online: https://www.jissec.org/Contents/V10/N3/V10N3-Samonas.html (accessed on 30 November 2023).
- Andreolini, M.; Colacino, V.G.; Colajanni, M.; Marchetti, M. A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises. Mob. Netw. Appl. 2020, 25, 236–247. [Google Scholar] [CrossRef]
- Suni, E.; Piispanen, J.; Nevala, J.; Päijänen, J.; Saharinen, K. D7.1 Report on Existing Cyber Ranges, Requirements; CyberSec4Europe: Bucharest, Romania, 2019. [Google Scholar]
- Debatty, T.; Mees, W. Building a Cyber Range for training CyberDefense Situation Awareness. In Proceedings of the 2019 International Conference on Military Communications and Information Systems (ICMCIS), Budva, Montenegro, 14–15 May 2019; IEEE Xplore: New York, NY, USA, 2019; pp. 1–6. [Google Scholar]
- Vykopal, J.; Vizvary, M.; Oslejsek, R.; Celeda, P.; Tovarnak, D. Lessons learned from complex hands-on defence exercises in a cyber range. In Proceedings of the 2017 IEEE Frontiers in Education Conference (FIE), Indianapolis, IN, USA, 18–21 October 2017; pp. 1–8. [Google Scholar]
- Roque, A.; Stetson, D.; Hannon, D.J. Assessing the cognitive complexity of cyber range environments. J. Def. Model. Simul. 2020, 17, 39–46. [Google Scholar] [CrossRef]
- Nakata, R.; Otsuka, A. CyExec*: A High-Performance Container-Based Cyber Range with Scenario Randomization. IEEE Access 2021, 9, 109095–109114. [Google Scholar] [CrossRef]
- Larrucea, X.; Santamaría, I. Designing a Cyber Range Exercise for Educational Purposes. In Systems, Software and Services Process Improvement, Proceedings of the 27th European Conference, EuroSPI 2020, Düsseldorf, Germany, 9–11 September 2020, Proceedings 27; Springer: Cham, Switzerland, 2020. [Google Scholar]
- NIST. Cyber Ranges. Working Group Training and Certifications Subgroup. 2018. Available online: https://www.nist.gov/system/files/documents/2018/02/13/cyber_ranges.pdf (accessed on 30 November 2023).
- Katsantonis, M.; Fouliras, P.; Mavridis, I. Conceptual analysis of cyber security education based on live competitions. In Proceedings of the IEEE Global Engineering Education Conference, Athens, Greece, 26–28 April 2017; pp. 771–779. [Google Scholar]
- Seker, E. The Concept of Cyber Defence Exercises (CDX): Planning, Execution, Evaluation. In Proceedings of the 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Scotland, UK, 11–12 June 2018; pp. 1–9. [Google Scholar] [CrossRef]
- Kianpour, M.; Kowalski, S.J.; Zoto, E.; Frantz, C.; Øverby, H. Designing Serious Games for Cyber Ranges: A Socio-technical Approach. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17–19 June 2019. [Google Scholar]
- Geris, l.; Lambrechts, T.; Carlier, A.; Papantoniou, I. The future is digital: In silico tissue engineering. Curr. Opin. Biomed. Eng. 2018, 6, 92–98. [Google Scholar] [CrossRef]
- COED. Concise Oxford English Dictionary, 12th ed.; Oxford University Press: Oxford, UK, 2011. [Google Scholar]
- ECSO WG5 PAPER—Understanding Cyber Ranges: From Hype to Reality. 2020. Available online: https://www.ecs-org.eu/documents/uploads/understanding-cyber-ranges-from-hype-to-reality.pdf (accessed on 30 November 2023).
- Ukwandu, E.; Farah, M.A.B.; Hindy, H.; Brosset, D.; Kavallieros, D.; Atkinson, R.; Tachtatzis, C.; Bures, M.; Andonovic, I.; Bellekens, X. A Review of Cyber-Ranges and Test-Beds: Current and Future Trends. Sensors 2020, 20, 7148. [Google Scholar] [CrossRef] [PubMed]
- Priyadarshini, I. Features and Architecture of the Modern Cyber Range: A Qualitative Analysis and Survey. Master’s Thesis, University of Delaware, Newark, Delaware, 2018. [Google Scholar]
- Leitner, M.; Frank, M.; Langner, G.; Landauer, M.; Skopik, F.; Smith, P.; Akhras, B.; Hotwagner, W.; Kucek, S.; Pahi, T.; et al. Enabling exercises, education and research with a comprehensive cyber range. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 2021, 12, 37–61. [Google Scholar]
- Lates, I.; Boja, C. Cyber Range Technology Stack Review. In Education, Research and Business Technologies. Smart Innovation, Systems and Technologies, Proceedings of the 21st International Conference on Informatics in Economy (IE 2022), Bucharest, Romania, 26–27 May 2022; Springer: Berlin/Heidelberg, Germany, 2023; Volume 321, pp. 25–40. [Google Scholar]
- Vykopal, J.; Ošlejšek, R.; Čeleda, P.; Vizváry, M.; Tovarnák, D. KYPO Cyber Range: Design and Use Cases. In Proceedings of the 12th International Conference on Software Technologies, Kuantan, Malaysia, 23–25 February 2017. [Google Scholar]
- Yamin, M.M.; Katt, B.; Gkioulos, V. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. Comput. Secur. 2020, 88, 101636. [Google Scholar] [CrossRef]
- Vekaria, K.B.; Calyam, P.; Wang, S.; Payyavula, R.; Rockey, M.; Ahmed, N. Cyber Range for Research-Inspired Learning of “Attack Defense by Pretense” Principle and Practice. IEEE Trans. Learn. Technol. 2021, 14, 322–337. [Google Scholar] [CrossRef]
- Smyrlis, M.; Somarakis, I.; Spanoudakis, G.; Hatzivasilis, G.; Ioannidis, S. CYRA: A Model-Driven CYber Range Assurance Platform. Appl. Sci. 2021, 11, 5165. [Google Scholar] [CrossRef]
- Frank, M.; Leitner, M.; Pahi, T. Design considerations for cyber security testbeds: A case study on a cyber security testbed for education. In Proceedings of the 3rd IEEE Conference on Cyber Science and Technology (CyberSciTec’17), Orlando, FL, USA, 6–10 November 2017; Dependable, Autonomic and Secure Computing. pp. 38–46. [Google Scholar]
- Childers, N.; Boe, B.; Cavallaro, L.; Cavedon, L.; Cova, M.; Egele, M.; Vigna, G. Organizing Large Scale Hacking Competitions. In Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of the 7th International Conference, DIMVA 2010, Bonn, Germany, 8–9 July 2010; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2010; p. 6201. [Google Scholar]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef]
- Rayyan. Terms of Service. 2023. Available online: https://www.rayyan.ai/terms-of-service/ (accessed on 30 November 2023).
- VOSviewer. Virtualizing Scientific Landscapes. Available online: https://www.vosviewer.com (accessed on 30 November 2023).
- ACM Digital Library. Available online: https://dl.acm.org (accessed on 25 November 2023).
- Google Scholar. Available online: https://scholar.google.com (accessed on 25 November 2023).
- IEEE Xplore. Available online: https://ieeexplore.ieee.org/Xplore/home.jsp (accessed on 25 November 2023).
- MDPI. Available online: https://www.mdpi.com (accessed on 25 November 2023).
- ScienceDirect. Available online: http://www.sciencedirect.com (accessed on 25 November 2023).
- Semantic Scholar. Available online: https://www.semanticscholar.org (accessed on 25 November 2023).
- Springer Link. Available online: https://link.springer.com (accessed on 25 November 2023).
- Research Gate. Available online: https://www.researchgate.net/ (accessed on 25 November 2023).
- Carnegie Mellon University. Available online: https://www.cmu.edu/ (accessed on 24 November 2023).
- Cornell University. Available online: https://www.cornell.edu/ (accessed on 24 November 2023).
- Chouliaras, N.; Kittes, G.; Kantzavelou, I.; Maglaras, L.; Pantziou, G.; Ferrag, M.A. Cyber Ranges and TestBeds for Education, Training, and Research. Appl. Sci. 2021, 11, 1809. [Google Scholar] [CrossRef]
- Chouliaras, N.; Kantzavelou, I.; Maglaras, L.; Pantziou, G.; Ferrag, M.A. A novel autonomous container-based platform for cybersecurity training and research. PeerJ Comput. Sci. 2023, 9, e1574. [Google Scholar] [CrossRef] [PubMed]
- Xu, O.; Kong, C.; Xian, M.; Liu, J.; Li, Z.; Chen, G. Cyber Range Research Based on Scientific Knowledge Map. In Proceedings of the 2021 International Conference on Computer Technology and Media Convergence Design (CTMCD), Sanya, China, 23–25 April 2021; pp. 133–137. [Google Scholar]
- Gustafsson, T.; Almroth, J. Cyber Range Automation Overview with a Case Study of CRATE. In Secure IT Systems, Proceedings of the 25th Nordic Conference, NordSec 2020, Virtual, 23–24 November 2020; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2021; p. 12556. [Google Scholar]
- Chaskos, E.; Diakoumakos, J.; Kolokotronis, N.; Lepouras, G. Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model. In Proceedings of the ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna, Austria, 23–26 August 2022; Volume 72, pp. 1–9. [Google Scholar]
- Katsantonis, M.N.; Manikas, A.; Mavridis, I.; Gritzalis, D. Cyber range design framework for cyber security education and training. Int. J. Inf. Secur. 2023, 22, 1005–1027. [Google Scholar] [CrossRef]
- Russo, E.; Costa, G.; Armando, A. Building Next Generation Cyber Ranges with CRACK. Comput. Secur. 2020, 95, 101837. [Google Scholar] [CrossRef]
- IBM. Prepare for a Cyber Breach with Command Center Mobile Cyber Range. Available online: https://www.ibm.com/security/services/managed-security-services/command-center-mobile (accessed on 24 November 2023).
- IBM Security. X-Force Command. IBM Employee? Visit ibm.biz/xforcecommand. Available online: https://www.ibm.com/downloads/cas/01ZOGZQ6 (accessed on 30 November 2023).
- Cyberium. Blockchain Cloud. Dual Side Low Code App Maker. Distributed ERP. Available online: https://www.cyberium.info/ (accessed on 24 November 2023).
- Davis, J.; Magrath, S. A Survey of Cyber Ranges and Testbeds; DTIC: Fort Belvoir, VA, USA, 2013; Available online: https://apps.dtic.mil/sti/citations/ADA594524 (accessed on 24 November 2023).
- Hara, K. Cyber Range CYBERIUM for Training Security Meisters to Deal with Cyber Attacks. Fujitsu Sci. Tech. J. 2019, 55, 59–63. [Google Scholar]
- Ranka, J. National Cyber Range. Technical Report; Strategic Technology; Defense Advanced Research Projects Agency: Arlington, VA, USA, 2011. [Google Scholar]
- Deckard, G.M. Cybertropolis: Breaking the Paradigm of Cyber-Ranges and Testbeds. In Proceedings of the 2018 IEEE International Symposium on Technologies for Homeland Security (HST), Woburn, MA, USA, 23–24 October 2018. [Google Scholar]
- Ficco, M.; Palmieri, F. Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios. J. Syst. Archit. 2019, 97, 107–129. [Google Scholar] [CrossRef]
- Berra, G.; Ferraro, G.; Fornero, M.; Maunero, N.; Prinetto, P.; Roascio, G. PAIDEUSIS: A Remote Hybrid CR for Hardware, Network, and IoT Security Training. In Proceedings of the Italian Conference on Cyber Security, Online, 7–9 April 2021. [Google Scholar]
- Tsai, P.; Yang, C. Testbed@TWISC: A Network Security Experiment Platform. 2017. Available online: https://onlinelibrary.wiley.com/doi/abs/10.1002/dac.3446 (accessed on 24 November 2023).
- Mengidis, N.; Bozhilova, M.; Ceresola, C.; Colabuono, C.; Cooke, M.; Depaix, G.; Genchev, A.; Koykov, G.; Mees, W.; Merialdo, M.; et al. Leveraging Cyber Ranges for Prototyping, Certification and Training: The ECHO Case. (IEEE). In Proceedings of the 2022 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 27–29 July 2022; pp. 299–304. [Google Scholar]
- Simulink. Simulation and Model-Based Design—MATLAB & Simulink. Design—Simulate—Deploy. Available online: https://www.mathworks.com/products/simulink.html (accessed on 25 November 2023).
- Packet Tracer. Computer Networking Notes and study Guides. CISCO. Available online: https://www.computernetworkingnotes.com/ccna-study-guide/download-packet-tracer-for-windows-and-linux.html (accessed on 25 November 2023).
- CML. Cisco Modeling Labs. Unleash Innovation by Unifying Experiences, and Cloud. Available online: https://www.cisco.com/c/en/us/products/cloud-systems-management/modeling-labs/index.html (accessed on 25 November 2023).
- NS2. Simulator Projects. Available online: https://ns2simulator.com/ns2-download (accessed on 25 November 2023).
- NS3. Simulator Projects. Unless Otherwise Noted, License for Website Content: CC BY-SA 4.0. Available online: https://www.nsnam.org/releases/ns-3-29/download (accessed on 25 November 2023).
- OMNeT++ Discrete Event Simulator. Available online: https://omnetpp.org (accessed on 25 November 2023).
- Mininet. An Instant Virtual Network on Your Laptop (or Other PC)—Mininet. Available online: http://mininet.org/ (accessed on 25 November 2023).
- GNS3. Available online: https://www.gns3.com/ (accessed on 25 November 2023).
- Emulab. Available online: https://www.emulab.net/portal/frontpage.php (accessed on 25 November 2023).
- QEMU. Available online: https://www.qemu.org/ (accessed on 24 November 2023).
- Santos, O. CCNP and CCIE Security Core SCOR 350-701 Official Cert Guide. Advance Your IT Career with Hands-On Learning. (Chapters 3, 5, 9). 2020. Available online: https://www.ciscopress.com/ (accessed on 25 November 2023).
- VSphere. Download VMware vSphere. VMware Customer Connect. Available online: https://customerconnect.vmware.com/en/downloads/info/slug/datacentercloud_infrastructure/vmware_vsphere/8_0 (accessed on 25 November 2023).
- ESXi. VMware vSphere Hypervisor for Free. VMware. Product Binaries. Available online: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.esxi.install.doc/GUID-31B6413C-E909-4F9D-9AD6-4090496B5D65.html (accessed on 25 November 2023).
- Vagrant. By HashiCorp. 2022. Available online: https://www.vagrantup.com/ (accessed on 25 November 2023).
- Hyper-V Server 2019. Review System Requirements. Microsoft. Available online: https://www.microsoft.com/en-us/evalcenter/download-hyper-v-server-2019 (accessed on 25 November 2023).
- Citrix Hypervisor 8.2LTSR. Part of Citrix Systems, Inc. Available online: https://www.citrix.com/downloads/citrix-hypervisor/ (accessed on 25 November 2023).
- VirtualBox. Oracle VM VirtualBox. Available online: https://www.virtualbox.org/ (accessed on 25 November 2023).
- VMware. Delivering a Digital Foundation for Businesses. Available online: https://www.vmware.com/ (accessed on 25 November 2023).
- Caturano, F.; d’Ambrosio, N.; Perrone, G.; Previdente, L.; Romano, S.P. ExploitWP2Docker: A Platform for Automating the Generation of Vulnerable WordPress Environments for Cyber Ranges. In Proceedings of the 2022 International Conference on Electrical, Computer and Energy Technologies (ICECET), Prague, Czech Republic, 20–22 July 2022. [Google Scholar]
- Docker. Install Engine. Available online: https://docs.docker.com/engine/install/ (accessed on 25 November 2023).
- OpenStack. Open Source Cloud Computing Infrastructure. Available online: https://www.openstack.org/ (accessed on 25 November 2023).
- LXC. Linux Containers. Available online: https://linuxcontainers.org/lxc/downloads/ (accessed on 25 November 2023).
- Openvz. Open Source Container-Based Virtualization for Linux. Available online: https://openvz.org/ (accessed on 25 November 2023).
- Amazon AWS. Secure and Resizable Cloud compute—Amazon EC2—Amazon Web Services. Available online: https://aws.amazon.com/ec2/ (accessed on 24 November 2023).
- IBM Cloud Computing. Available online: https://www.ibm.com/cloud (accessed on 24 November 2023).
- Microsoft Inc. Microsoft Azure: Cloud Computing Services. Available online: https://azure.microsoft.com/en-us/ (accessed on 24 November 2023).
- Oikonomou, N.; Mengidis, N.; Spanopoulos-Karalexidis, M.; Voulgaridis, A.; Merialdo, M.; Raisr, I.; Hanson, K.; Vallee, P.; Tsikrika, T.; Vrochidis, S.; et al. ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021; IEEE Xplore: New York, NY, USA, 2021; pp. 403–408. [Google Scholar]
- Brown, R. Computer Security Threats: A Brief History; Dell Blog; Dell: Round Rock, TX, USA, 2014. [Google Scholar]
- Pham, C.; Tang, D.; Chinen, K.-I.; Beuran, R. CyRIS: A Cyber Range Instantiation System for Facilitating Security Training. In Proceedings of the 7th Symposium on Information and Communication Technology, Ho Chi Minh City, Vietnam, 8–9 December 2016. [Google Scholar]
- Lates, I. Cyber Ranges Implementation Methodology. In Proceedings of the International Conference on Business Excellence, Bucharest, Romania, 24–26 March 2022. [Google Scholar]
- Avatao. Interactive Secure Coding Training. Available online: https://avatao.com (accessed on 25 November 2023).
- Pandey, B.; Ahmad, S. Introduction to the Cyber Ranges, Chapman & Hall/CRC: Boca Raton, FL, USA, 2022.
- Schreuders, Z.C.; Shaw, T.; Shan-A-Khuda, M.; Ravichandran, G.; Keighley, J. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-Scenario VMs for Learning Computer Security and Hosting CTF Events; USENIX: Berkeley, CA, USA, 2017. [Google Scholar]
- Binz, T.; Breitenbücher, U.; Kopp, O.; Leymann, F. TOSCA: Portable Automated Deployment and Management of Cloud Applications. In Advanced Web Services; Springer: New York, NY, USA, 2014. [Google Scholar]
- Jiang, H.; Choi, T.; Ko, R.K.L. Pandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools. In Security in Computing and Communications, Proceedings of the 8th International Symposium, SSCC 2020, Chennai, India, 14–17 October 2020; Springer: Berlin/Heidelberg, Germany, 2020; p. 1364. [Google Scholar]
- Beuran, R.; Tang, D.; Pham, C.; Chinen, K.-I.; Tan, Y.; Shinoda, Y. CyTrONE: An Integrated Cybersecurity Training Framework. Comput. Secur. 2017, 78, 43–59. [Google Scholar] [CrossRef]
- Yamin, M.M.; Katt, B. Inefficiencies in Cyber-Security Exercises Life-Cycle: A Position Paper. In Proceedings of the AAAI Symposium on Adversary-Aware Learning Techniques and Trends in Cybersecurity (ALEC), Arlington, VA, USA, 18–20 October 2018. [Google Scholar]
- Chadha, R.; Bowen, T.; Chiang, C.-Y.J.; Gottlieb, Y.M.; Poylisher, A.; Sapello, A.; Serban, C.; Sugrim, S.; Walther, G.; Marvel, L.M.; et al. CyberVAN: A Cyber Security Virtual Assured Network testbed. In Proceedings of the 2016 IEEE Military Communications Conference, Baltimore, MD, USA, 1–3 November 2016. [Google Scholar]
- Wermann, A.G.; Bortolozzo, M.C.; Da Silva, E.G.; Schaeffer-Filho, A.; Gaspary, L.P.; Barcellos, M. ASTORIA: A Framework for Attack Simulation and Evaluation in Smart Grids. In Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, Istanbul, Turkey, 25–29 April 2016. [Google Scholar]
- Yamin, M.M.; Katt, B. Modeling and executing cyber security exercise scenarios in cyber ranges. Comput. Secur. 2022, 116, 102635. [Google Scholar] [CrossRef]
- Schmidt, D.C. Model Driven Engineering; Vanderbilt University: Nashville, TN, USA, 2006. [Google Scholar]
- Peratikou, A.; Louca, C.; Shiaeles, S.; Stavrou, S. On Federated Cyber Range Network Interconnection; University of Portsmouth, Research Portal: Portsmouth, UK, 2020. [Google Scholar]
- Park, M.; Lee, H.; Kim, Y.; Kim, K.; Shin, D. Design and Implementation of Multi-Cyber Range for Cyber Training and Testing. Appl. Sci. 2022, 12, 12546. [Google Scholar] [CrossRef]
Inclusion Criteria (IC) | |
---|---|
IC1 | Articles related to the general capabilities and functionality of CRs |
IC2 | Articles particularly related to CRs in CPS and ITN domains of interest |
Exclusion Criteria (EC) | |
EC1 | Articles generally focus only on the cybersecurity domain |
Sector Label | Dataset Description | Ratio |
---|---|---|
A | Refers to datasets concerning a wide range of CR issues such as automation, scenario mechanisms, scoring systems, orchestration mechanisms, performance, infrastructure provisioning and programmability, resource allocation and efficiency, hardware and software tools, runtime and safe execution, and type of exercise | 6/11 (~55%) |
B | Refers to datasets based on the methodology used, the deployment methods, and mechanisms when they need to be conducted and executed | 3/11 (~27%) |
C | Refers to datasets on standardized models that simplify the process of design methods | 1/11 (~9%) |
D | Refers to datasets on the federation deployment, which can offer users a one-stop shop for all their needs | 1/11 (~9%) |
Article Title | Label | Pub. Year | Ref. |
---|---|---|---|
KYPO Cyber Range: Design and Use Cases | (B) | 2017 | [21] |
A Review of Cyber-Ranges and TestBeds: Current and Future Trends | (A) | 2020 | [17] |
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture | (A) | 2020 | [22] |
Understanding Cyber Ranges: From Hype to Reality | (A) | 2020 | [16] |
Model-Driven CYber Range Assurance Platform | (C) | 2021 | [24] |
Cyber Range Automation Overview with a Case Study of CRATE | (B) | 2021 | [43] |
Cyber Range for Research-Inspired Learning of Attack Defense by Pretense Principle and Practice | (A) | 2021 | [23] |
Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model | (D) | 2022 | [44] |
A novel autonomous container-based platform for cybersecurity training and research | (B) | 2023 | [41] |
Cyber Range Technology Stack Review | (A) | 2023 | [20] |
Cyber range design framework for cybersecurity education and training | (A) | 2023 | [45] |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Stamatopoulos, D.; Katsantonis, M.; Fouliras, P.; Mavridis, I. Exploring the Architectural Composition of Cyber Ranges: A Systematic Review. Future Internet 2024, 16, 231. https://doi.org/10.3390/fi16070231
Stamatopoulos D, Katsantonis M, Fouliras P, Mavridis I. Exploring the Architectural Composition of Cyber Ranges: A Systematic Review. Future Internet. 2024; 16(7):231. https://doi.org/10.3390/fi16070231
Chicago/Turabian StyleStamatopoulos, Dionysios, Menelaos Katsantonis, Panagiotis Fouliras, and Ioannis Mavridis. 2024. "Exploring the Architectural Composition of Cyber Ranges: A Systematic Review" Future Internet 16, no. 7: 231. https://doi.org/10.3390/fi16070231
APA StyleStamatopoulos, D., Katsantonis, M., Fouliras, P., & Mavridis, I. (2024). Exploring the Architectural Composition of Cyber Ranges: A Systematic Review. Future Internet, 16(7), 231. https://doi.org/10.3390/fi16070231