A review of cyber-ranges and test-beds: Current and future trends

E Ukwandu, MAB Farah, H Hindy, D Brosset… - Sensors, 2020 - mdpi.com
Cyber situational awareness has been proven to be of value in forming a comprehensive
understanding of threats and vulnerabilities within organisations, as the degree of exposure …

Cyber ranges and testbeds for education, training, and research

N Chouliaras, G Kittes, I Kantzavelou, L Maglaras… - Applied Sciences, 2021 - mdpi.com
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …

Generating realistic cyber data for training and evaluating machine learning classifiers for network intrusion detection systems

M Chalé, ND Bastian - Expert Systems with Applications, 2022 - Elsevier
Cyberspace operations, in conjunction with artificial intelligence and machine learning
enhanced cyberspace infrastructure, make it possible to connect sensors directly to shooters …

Enhancing malware analysis sandboxes with emulated user behavior

S Liu, P Feng, S Wang, K Sun, J Cao - Computers & Security, 2022 - Elsevier
Cybersecurity teams have widely used malware analysis sandboxes to investigate the threat
of malware. Correspondingly, armored malware adopts various anti-sandbox techniques to …

Cyber range automation overview with a case study of CRATE

T Gustafsson, J Almroth - Nordic Conference on Secure IT Systems, 2020 - Springer
Cyber security research is quintessential to secure computerized systems against cyber
threats. Likewise, cyber security training and exercises are instrumental in ensuring that the …

Cyber range design framework for cyber security education and training

MN Katsantonis, A Manikas, I Mavridis… - International Journal of …, 2023 - Springer
The need for effective training of cyber security personnel working in critical infrastructures
and in the corporate has brought attention to the evolution of Cyber Ranges (CRs) as …

Cyra: A model-driven cyber range assurance platform

M Smyrlis, I Somarakis, G Spanoudakis, G Hatzivasilis… - Applied Sciences, 2021 - mdpi.com
Featured Application Internet of Things, Industrial Internet of Things and 5G Cyber Range.
Abstract Digital technologies are facilitating our daily activities, and thus leading to the social …

[PDF][PDF] Cyber red teaming: overview of sly, an orchestration tool

P de La Vallée, G Losifidis, W Mees - Information & Security, 2022 - connections-qj.org
The complexity of protecting interconnected IT systems grows with the development of new
products and applications. Consequently, the capability of Security Operation Centre …

Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation

S Liu, S Wang, K Sun - 2023 53rd Annual IEEE/IFIP …, 2023 - ieeexplore.ieee.org
Honeypot is an effective tool widely adopted in security systems, providing rich information
to lure attackers. However, honeypots are not foolproof and can be detected by …

Developing a cyber incident exercises model to educate security teams

B Alothman, A Alhajraf, R Alajmi, RA Farraj… - Electronics, 2022 - mdpi.com
Since cyber attacks are increasing and evolving rapidly, the need to enhance cyber-security
defense is crucial. A cyber incident exercise model is a learning technique to provide …