Programmatic Description Language for Cyber Range Topology Creation

Andrea Dalla Costa, Jarkko Kuusijärvi
{"title":"Programmatic Description Language for Cyber Range Topology Creation","authors":"Andrea Dalla Costa, Jarkko Kuusijärvi","doi":"10.1109/eurospw55150.2022.00048","DOIUrl":null,"url":null,"abstract":"Cyber Ranges are becoming a fundamental part of cybersecurity training and preparations, since they allow testing different scenarios in a safe, isolated and repro-ducible environment. We can expect to see cyber ranges used even more in cybersecurity trainings and testing of various system deployments, which also means increasing amount of scenarios to be developed. It is beneficial to make the scenario development/generation easier and faster for the human operators and automated generation alike to support the different use cases requirements. This paper analyses the currently available open-source and/or research community solutions for defining topologies for cyber ranges and presents the enhanced description language developed. The description language aims to sim-plify the scenario creation process for large networks with features that support quick and easy specification of the initial topology. This paper describes the enhanced features that enable the language to describe topologies in a compact form and presents initial test topology creation in lab settings deployed in OpenStack environment.","PeriodicalId":275840,"journal":{"name":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/eurospw55150.2022.00048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cyber Ranges are becoming a fundamental part of cybersecurity training and preparations, since they allow testing different scenarios in a safe, isolated and repro-ducible environment. We can expect to see cyber ranges used even more in cybersecurity trainings and testing of various system deployments, which also means increasing amount of scenarios to be developed. It is beneficial to make the scenario development/generation easier and faster for the human operators and automated generation alike to support the different use cases requirements. This paper analyses the currently available open-source and/or research community solutions for defining topologies for cyber ranges and presents the enhanced description language developed. The description language aims to sim-plify the scenario creation process for large networks with features that support quick and easy specification of the initial topology. This paper describes the enhanced features that enable the language to describe topologies in a compact form and presents initial test topology creation in lab settings deployed in OpenStack environment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络范围拓扑创建的程序化描述语言
网络靶场正在成为网络安全培训和准备的基本组成部分,因为它们允许在安全、隔离和可复制的环境中测试不同的场景。我们可以预期,网络范围将更多地用于网络安全培训和各种系统部署的测试,这也意味着需要开发更多的场景。对于人工操作人员和自动生成人员来说,使场景开发/生成更容易和更快以支持不同的用例需求是有益的。本文分析了目前可用的用于定义网络范围拓扑的开源和/或研究社区解决方案,并介绍了开发的增强描述语言。描述语言的目的是简化大型网络的场景创建过程,其特性支持对初始拓扑进行快速简便的规范。本文描述了增强的特性,使该语言能够以紧凑的形式描述拓扑,并介绍了在部署在OpenStack环境中的实验室设置中创建的初始测试拓扑。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Reliability of IP Geolocation Services for Assessing the Compliance of International Data Transfers GNPassGAN: Improved Generative Adversarial Networks For Trawling Offline Password Guessing Towards an Operations-Aware Experimentation Methodology Two de-anonymization attacks on real-world location data based on a hidden Markov model Reviewing Estimates of Cybercrime Victimisation and Cyber Risk Likelihood
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1