JAIST Repository >
School of Information Science >
Conference Papers >
Conference Papers >

Please use this identifier to cite or link to this item: http://hdl.handle.net/10119/15062

Title: CyRIS: A Cyber Range Instantiation System for Facilitating Security Training
Authors: Pham, Cuong
Tang, Dat
Chinen, Ken-ichi
Beuran, Razvan
Keywords: cybersecurity
cyber range
cybersecurity education
cybersecurity practice
Issue Date: 2016-12-08
Publisher: Association for Computing Machinery
Magazine name: SoICT '16 Proceedings of the Seventh Symposium on Information and Communication Technology
Start page: 251
End page: 258
DOI: 10.1145/3011077.3011087
Abstract: Cyber ranges are well-defined controlled virtual environments used in cybersecurity training as an efficient way for trainees to gain practical knowledge through hands-on activities. However, creating an environment that contains all the necessary features and settings, such as virtual ma chines, network topology and security-related content, is not an easy task, especially for a large number of participants. Therefore, we propose CyRIS (Cyber Range Instantiation System) as a solution towards this problem. CyRIS provides a mechanism to automatically prepare and manage cyber ranges for cybersecurity education and training based on specifications defined by the instructors. In this paper, we first describe the design and implementation of CyRIS, as well as its utilization. We then present an evaluation of CyRIS in terms of feature coverage compared to the Technical Guide to Information Security Testing and Assessment of the U.S National Institute of Standards and Technology, and in terms of functionality compared to other similar tools. We also discuss the execution performance of CyRIS for several representative scenarios.
Rights: (c) ACM, 2016. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in SoICT '16 Proceedings of the Seventh Symposium on Information and Communication Technology, 2016, 251-258. http://dx.doi.org/10.1145/3011077.3011087
URI: http://hdl.handle.net/10119/15062
Material Type: author
Appears in Collections:b11-1. 会議発表論文・発表資料 (Conference Papers)

Files in This Item:

File Description SizeFormat
23364.pdf363KbAdobe PDFView/Open

All items in DSpace are protected by copyright, with all rights reserved.

 


Contact : Library Information Section, JAIST (ir-sys[at]ml.jaist.ac.jp)