2020
DOI: 10.1016/j.cose.2019.101636
|View full text |Cite
|
Sign up to set email alerts
|

Cyber ranges and security testbeds: Scenarios, functions, tools and architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
75
0
3

Year Published

2020
2020
2021
2021

Publication Types

Select...
4
4

Relationship

2
6

Authors

Journals

citations
Cited by 137 publications
(78 citation statements)
references
References 27 publications
0
75
0
3
Order By: Relevance
“…The most recent literature by Yamin et al [ 20 ] reviews unclassified CRs and security TBs. The authors propose a taxonomy with reference to the architecture, scenarios, capabilities, roles, and tools as the criteria.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The most recent literature by Yamin et al [ 20 ] reviews unclassified CRs and security TBs. The authors propose a taxonomy with reference to the architecture, scenarios, capabilities, roles, and tools as the criteria.…”
Section: Related Workmentioning
confidence: 99%
“…Yamin et al [ 20 ] state that scenarios consist of Purpose, Environment, Storyline, Type, Domain and Tools, features to appropriately classifying a scenario aligned with the objectives of the exercise/training. The major differences between TB and CR scenarios are in the attack scenarios being simulated or emulated ( Figure 14 ).…”
Section: Scenarios and Applicationsmentioning
confidence: 99%
“…There are varying definitions of what constitutes a cyber range. Yamin et al in [ 6 ] define a cyber range as an environment providing testbeds for research and conducting training through programs. Alternatively, Kavallieratos et al in [ 7 ] describe a cyber range as an interactive, simulated representations of an organization’s local technical infrastructure connected to a simulated Internet.…”
Section: Related Workmentioning
confidence: 99%
“…The suitability of each option depends on the wider context on which the cyber range is being built. Yamin et al [ 6 ] also argue that there are 6 aspects that are needed for a cyber range to be considered fully functioning and effective. These are monitoring capabilities, learning, management, teaming, the environment, and scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…In case of IoT such endeavors are possible but due the the ever expanding IoT landscape achieving such thing would be very difficult and financially not feasible, as reconstructing a digital replica of a smart city with physical devices for forensic investigation is not piratical. Cyber ranges [ 21 ] can have a valid use case in this domain for creating the digital twin of the crime scene for crime event reconstruction.…”
Section: Police Needsmentioning
confidence: 99%