Το τεκμήριο παρέχεται από τον φορέα :
University of West Attica   

Αποθετήριο :
Institutional Repository Polynoe   

δείτε την πρωτότυπη σελίδα τεκμηρίου
στον ιστότοπο του αποθετηρίου του φορέα για περισσότερες πληροφορίες και για να δείτε όλα τα ψηφιακά αρχεία του τεκμηρίου*



Cyber range systems for education and research

Χουλιάρας, Νέστορας

Kakarountas, Athanasios
Maglaras, Leandros
Σχολή Μηχανικών
Bogris, Adonis
Katsikas, Sokratis
Kantzavelou, Ioanna
Pantziou, Grammati
Mamalis, Basilis
Τμήμα Μηχανικών Πληροφορικής και Υπολογιστών

Διδακτορική διατριβή

2024-12-06

2025-02-05T14:35:10Z


In recent years, the proliferation of cyber threats has highlighted a critical shortage of cybersecurity professionals equipped with practical, hands-on experience. The escalating frequency and sophistication of cyber-attacks underscore the urgent need for robust training solutions to bridge this skills gap. Cyber Ranges play a pivotal role in addressing this challenge by offering immersive, experiential learning environments for cybersecurity professionals. Traditional education and certification programs often fail to equip individuals with the practical skills necessary to defend against real-world cyber attacks. Consequently, organizations remain vulnerable to sophisticated cyber threats due to the lack of skilled professionals capable of effectively mitigating these risks. Cyber Ranges provide a viable solution to this skills gap by offering hands-on training in simulated environments that mirror real-world cyber threats. By immersing participants in realistic scenarios, Cyber Ranges enable cybersecurity professionals to develop practical skills and experience in responding to various cyber-attacks. Additionally, Cyber Ranges facilitate collaboration and teamwork, fostering a dynamic learning environment conducive to skill development and knowledge sharing. This research proposes a novel Cyber Range architecture based on container technology, aimed at addressing the limitations of current systems. It provides a comprehensive review of the existing state-of-the-art in testbeds and Cyber Ranges, identifying gaps and shortcomings that need to be addressed. The proposed architecture is designed to be flexible, efficient, and scalable, incorporating advanced features that support realistic, large-scale cyber threat simulations. A detailed design of the proposed architecture is presented, outlining the requirements and specifications necessary for its implementation. The study explores innovative training methods using Cyber Ranges, including behavioral strategies and gamification techniques, to enhance the hands-on learning experience. Various use case scenarios demonstrate the effectiveness of the new system in realistic settings, highlighting its capabilities and the challenges encountered during implementation. An evaluation of the system’s performance is conducted through stress testing and user feedback, comparing the benefits of container-based implementations over traditional virtual machine-based systems. The results show significant improvements in scalability, adaptability, and user acceptance, underscoring the effectiveness of the proposed architecture in bridging the cybersecurity skills gap. By offering access to realistic training environments and practical experiences, the proposed Cyber Range system empowers individuals to enhance their cybersecurity capabilities and contributes to strengthening organizational resilience against cyber attacks. The study provides insights into future research directions to further enhance Cyber Range capabilities and integration.


Docker
Openstack
Cyber ranges
Security testbeds
Cybersecurity
Kolla-Ansible

Αγγλική γλώσσα

Πανεπιστήμιο Δυτικής Αττικής

ΣΧΟΛΗ ΜΗΧΑΝΙΚΩΝ - Τμήμα Μηχανικών Πληροφορικής και Υπολογιστών - Διδακτορικές διατριβές

Αναφορά Δημιουργού - Μη Εμπορική Χρήση - Παρόμοια Διανομή 4.0 Διεθνές
https://creativecommons.org/licenses/by-nc-sa/4.0/deed.el




*Η εύρυθμη και αδιάλειπτη λειτουργία των διαδικτυακών διευθύνσεων των συλλογών (ψηφιακό αρχείο, καρτέλα τεκμηρίου στο αποθετήριο) είναι αποκλειστική ευθύνη των αντίστοιχων Φορέων περιεχομένου.