Design and Implementation of Multi-Cyber Range for Cyber Training and Testing
-
Published:2022-12-07
Issue:24
Volume:12
Page:12546
-
ISSN:2076-3417
-
Container-title:Applied Sciences
-
language:en
-
Short-container-title:Applied Sciences
Author:
Park MoosungORCID, Lee Hyunjin, Kim Yonghyun, Kim KookjinORCID, Shin DongkyooORCID
Abstract
It is essential to build a practical environment of the training/test site for cyber training and weapon system test evaluation. In a military environment, cyber training sites should be continuously developed according to the characteristics of the military. Weapons with cyber security capabilities should be deployed through cyber security certification. Recently, each military has been building its own cyber range that simulates its battlefield environment. However, since the actual battlefield is an integrated operation environment, the cyber range built does not reflect the integrated battlefield environment that is interconnected. This paper proposes a configuration plan and operation function to construct a multi-cyber range reflecting the characteristics of each military to overcome this situation. In order to test the multi-cyber range, which has scenario authoring and operation functions, and can faithfully reflect reality, the impact of DDoS attacks is tested. It is a key to real-world mission-based test evaluation to ensure interoperability between military systems. As a result of the experiment, it was concluded that if a DDoS attack occurs due to the infiltration of malicious code into the military network, it may have a serious impact on securing message interoperability between systems in the military network. Cyber range construction technology is being developed not only in the military, but also in school education and businesses. The proposed technology can also be applied to the construction of cyber ranges in industries where cyber-physical systems are emphasized. In addition, it is a field that is continuously developing with the development of technology, such as being applied as an experimental site for learning machine learning systems.
Funder
National Research Foundation of Korea
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference20 articles.
1. Bloom, J. (2011). The Financial Implication of Technical Debt, CAST Software Ltd. 2. Damodaran, S.K., and Smith, K. (2015). CRIS Cyber Range Lexicon, MIT Lincoln Laboratory. Version 1.0 (Report 59-0001). 3. Hutchison, S.J. (2013). Shift Left! Test Earlier in the Life Cycle, Defense Acquisition University. 4. Oikonomou, N., Mengidis, N., Spanopoulos-Karalexidis, M., Voulgaridis, A., Merialdo, M., Raisr, L., Hanson, K., Vallee, P.L., Tsikrika, T., and Vrochidis, S. (2021, January 26–28). ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges. Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece. 5. Urias, V.E., Stout, W.M.S., Van Leeuwen, B., and Lin, H. (2018, January 22–25). Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position Paper. Proceedings of the 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, QC, Canada.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|