Evaluation of vulnerability reproducibility in container-based Cyber Range

10/30/2020
by   Ryotaro Nakata, et al.
0

A cyber range, a practical and highly educational information security exercise system, is difficult to implement in educational institutions because of the high cost of implementing and maintaining it. Therefore, there is a need for a cyber range that can be adopted and maintained at a low cost. Recently, container type virtualization is gaining attention as it can create a high-speed and high-density exercise environment. However, existing researches have not clearly shown the advantages of container virtualization for building exercise environments. And it is not clear whether the sufficient vulnerabilities are reproducible, which is required to conduct incident scenarios in cyber range. In this paper, we compare container virtualization with existing virtualization type and confirm that the amount of memory, CPU, and storage consumption can be reduced to less than 1/10 of the conventional virtualization methods. We also compare and verify the reproducibility of the vulnerabilities used in common exercise scenarios and confirm that 99.3 vulnerabilities are reproducible. The container-based cyber range can be used as a new standard to replace existing methods.

READ FULL TEXT

page 3

page 4

page 6

page 12

research
07/10/2023

Towards Automated Cyber Range Design: Characterizing and Matching Demands to Supplies

Cyber ranges mimic real-world cyber environments and are in high demand....
research
02/16/2023

Cyber-risk Perception and Prioritization for Decision-Making and Threat Intelligence

Cyber-risk assessment is gaining momentum due to the wide range of resea...
research
02/01/2021

Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification

A Digital Twin (DT) is a digital representation of a physical object use...
research
02/28/2022

Proceedings of the Artificial Intelligence for Cyber Security (AICS) Workshop at AAAI 2022

The workshop will focus on the application of AI to problems in cyber se...
research
10/27/2020

An Analysis of Security Vulnerabilities in Container Images for Scientific Data Analysis

Software containers greatly facilitate the deployment and reproducibilit...
research
03/11/2021

Towards Determining the Effect of Age and Educational Level on Cyber-Hygiene

As internet related challenges increase such as cyber-attacks, the need ...
research
01/18/2020

Automating the Generation of Cyber Range Virtual Scenarios with VSDL

A cyber range is an environment used for training security experts and t...

Please sign up or login with your details

Forgot password? Click here to reset