GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range

Author:

Mills Alan1ORCID,White Jonathan1ORCID,Legg Phil1ORCID

Affiliation:

1. School of Computing and Creative Technologies, University of the West of England, Bristol BS16 1QY, UK

Abstract

Cyberattacks are rapidly evolving both in terms of techniques and frequency, from low-level attacks through to sophisticated Advanced Persistent Threats (APTs). There is a need to consider how testbed environments such as cyber ranges can be readily deployed to improve the examination of attack characteristics, as well as the assessment of defences. Whilst cyber ranges are not new, they can often be computationally expensive, require an extensive setup and configuration, or may not provide full support for areas such as logging or ongoing learning. In this paper, we propose GoibhniUWE, a container-based cyber range that provides a flexible platform for investigating the full lifecycle of a cyberattack. Adopting a modular approach, users can seamlessly switch out existing, containerised vulnerable services and deploying multiple different services at once, allowing for the creation of complex and realistic deployments. The range is fully instrumented with logging capabilities from a variety of sources including Intrusion Detection Systems (IDSs), service logging, and network traffic captures. To demonstrate the effectiveness of our approach, we deploy the GoibhniUWE range under multiple conditions to simulate various vulnerable environments, reporting on and comparing key metrics such as CPU and memory usage. We simulate complex attacks which span multiple services and networks, with logging at multiple levels, modelling an Advanced Persistent Threat (APT) and their associated Tactics, Techniques, and Procedures (TTPs). We find that even under continuous, active, and targeted deployment, GoibhniUWE averaged a CPU usage of less than 50%, in an environment using four single-core processors, and memory usage of less than 4.5 GB.

Funder

internal Expanding Research Excellence funding scheme at the University of the West of England

Publisher

MDPI AG

Reference25 articles.

1. DetectionLab (2024, February 06). Introduction: DetectionLab. Available online: https://www.detectionlab.network/.

2. Splunk Threat Research Team (2024, February 06). Attack Range v3.0|Splunk. Available online: https://www.splunk.com/en_us/blog/security/attack-range-v3-0.html.

3. Atomic Red Team (2024, March 06). Explore Atomic Red Team. Available online: https://atomicredteam.io/.

4. Splunk (2024, August 23). Issues-splunk/attack_range. Available online: https://github.com/splunk/attack_range/issues.

5. Vulhub (2023, November 06). Pre-Built Vulnerable Environments Based on Docker-Compose. Available online: https://github.com/vulhub/vulhub.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3