Skip to main content

Cyber Ranges: The New Training Era in the Cybersecurity and Digital Forensics World

  • Chapter
  • First Online:
Technology Development for Security Practitioners

Abstract

Cybersecurity is one of the prominent global challenges due to a significant increase in the number of cyber-attacks over the last few decades. To protect enterprises, personal data, and productivity and to ensure a safe working environment, cybersecurity awareness is crucial. For the successful prevention and mitigation of sophisticated cyber-attacks and minimization of cyberthreat risks, engagement in training activities is vital. Cyber ranges are environments offering tools and services to support cybersecurity and forensic simulation and training experience. Therefore, the design and development of cyber ranges have become a necessity for many governmental bodies and organizations such as law enforcement and defence agencies. In other words, a cyber range allows the reproduction of IT and/or OT systems execution in a simulated environment (composed by both virtual and physical components). In this way, this chapter highlights the concept of cyber ranges, mainly giving a well-defined overview of them, focusing on two types of stakeholders, LEAs and defence. First, several cyber ranges have been taken into consideration to identify significant attributes as well as categorization based on several properties. Finally, the ambition of the chapter is to provide a projection of the future capabilities and potentials about cyber range design, implementation, and execution of training, targeting the improvement of the involved end-users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. DoD CR [Online]. Available: https://www.hqmc.marines.mil/docscr/. Accessed 27 Nov 2019.

  2. Arizona Cyber Warfare Range [Online]. Available: https://www.azcwr.org/. Accessed 27 Nov 2019.

  3. HNS platform [Online]. Available: https://www.hns-platform.com/. Accessed 27 Nov 2019.

  4. ManTech [Online]. Available: https://www.mantech.com/capabilities/cyber. Accessed 27 Nov 2019.

  5. École Navale CR [Online]. Available: https://www.chaire-cyber-navale.fr/. Accessed 27 Nov 2019.

  6. AirBus CR [Online]. Available: https://airbus-cyber-security.com/products-and-services/prevent/cyberrange/. Accessed 27 Nov 2019.

  7. Kypo CR [Online]. Available: https://www.kypo.cz/en. Accessed 27 Nov 2019.

  8. Augusta Cyber Range [Online]. Available: https://cyber.augusta.edu/georgia/. Accessed 27 Nov 2019.

  9. US Cyber Range [Online]. Available: https://www.uscyberrange.org/. Accessed 27 Nov 2019.

  10. AIT [Online]. Available: https://www.ait.ac.at/en/research-topics/cyber-security/cyber-range/. Accessed 27 Nov 2019.

  11. Saros [Online]. Available: http://www.saros.co.uk/products/it/cyber-range/. Accessed 27 Nov 2019.

  12. Rhea CR [Online]. Available: https://www.rheagroup.com/services/cyber-and-physical-security. Accessed 27 Nov 2019.

  13. Virginia CR [Online]. Available: https://www.virginiacyberrange.org/. Accessed 27 Nov 2019.

  14. The Michigan CR [Online]. Available: https://www.merit.edu/cyberrange/. Accessed 27 Nov 2019.

  15. Ixia CR [Online]. Available: https://www.ixiacom.com/solutions/cyber-range. Accessed 27 Nov 2019.

  16. Palo Alto [Online]. Available: https://www.paloaltonetworks.com/solutions/initiatives/cyberrange-overview. Accessed 27 Nov 2019.

  17. IBM [Online]. Available: https://www.ibm.com/security/services/managed-security-services/security-operations-centers. Accessed 27 Nov 2019.

  18. Cybexer [Online]. Available: https://cybexer.com/. Accessed 27 Nov 2019.

  19. Raytheon [Online]. Available: https://www.raytheon.com. Accessed 27 Nov 2019.

  20. Cyberbit [Online]. Available: https://www.cyberbit.com/solutions/cyber-range/. Accessed 27 Nov 2019.

  21. Breaking Point [Online]. Available: https://www.ixiacom.com/products/network-security-testing-breakingpoint. Accessed 27 Nov 2019.

  22. RGCE [Online]. Available: https://jyvsectec.fi/cyber-range/. Accessed 27 Nov 2019.

  23. Berkatweb [Online]. Available: https://www.berkatweb.com/cyber-range/. Accessed 27 Nov 2019.

  24. Cyber-Gym [Online]. Available: https://www.cybergym.com/. Accessed 27 Nov 2019.

  25. Cisco Threats Report [Online]. Available: https://www.cisco.com/c/en/us/products/security/security-reports.html. Accessed 03 Dec 2019.

  26. Cyber-security training: A comparative analysis of cyber ranges and emerging trends [Online]. Available: https://pergamos.lib.uoa.gr/uoa/dl/frontend/file/lib/default/data/2864976/theFile. Accessed 02 Dec 2019.

  27. CyberCents [Online]. Available: https://cybercents.com/cyber-ranges/cents/. Accessed 27 Nov 2019.

  28. Silensec Cyber Range [Online]. Available: https://cyberranges.com/#cyber-range-securing-cyber-space. Accessed 27 Nov 2019.

  29. [MISP – Open Source Threat Intelligence Platform & Open Standards for Threat Information Sharing [Online]. Available: http://www.misp-project.org. Accessed 02 Dec 2019.

  30. Lessons learned from complex hands-on defense exercises in a cyber range [Online]. Available: https://ieeexplore.ieee.org/document/8190713. Accessed 02 Dec 2019.

  31. Locked Shields 2018 After Action Report. Accessed 02 Dec 2019.

  32. NIST: Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities [Online]. Available: https://www.nist.gov/publications/guide-test-training-and-exercise-programs-it-plans-and-capabilities. Accessed 04 Dec 2019.

  33. Smith, R. (2010). The long history of gaming in military training. Simulation and Gaming, 41, 6–19. https://doi.org/10.1177/1046878109334330.

    Article  Google Scholar 

  34. CSS Cyber Defense Report, Cybersecurity and Cyber defense Exercises [Online]. Available: https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2018-10-Cyber_Exercises.pdf. Accessed 04 Dec 2019.

  35. Prior, T., & Roth, F. (2016). CSS study: Learning from disaster events and exercises in civil protection organizations (CSS Study), risk and resilience reports. Zurich: Center for Security Studies.

    Google Scholar 

  36. CCDCOE Cyber Defense Exercise [Online]. Available: https://ccdcoe.org/exercises/locked-shields/. Accessed 04 Dec 2019.

  37. Role and impact of digital Forensics in cyber crime investigations [Online]. Available: https://www.researchgate.net/publiction/331991596_ROLE_AND_IMPACT_OF_DIGITAL_FORENSICS_IN_CYBER_CRIME_INVESTIGATIONS/link/5c9a39c445851506d72d8fdc/download. Accessed 04 Dec 2019.

  38. Qiu, P., Cisco Cyber Range [Online]. Available: https://www.cisco.com/c/dam/global/en_hk/assets/event/cisco_connect_2015/pdf/4-3.pdf. Accessed 17 Dec 2019.

Download references

Acknowledgements

The FORESIGHT project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No. 833673. The results reflect only the author’s view, and the agency is not responsible for any use that may be made of the information it contains.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Athanasios Grigoriadis .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Grigoriadis, A., Darra, E., Kavallieros, D., Chaskos, E., Kolokotronis, N., Bellekens, X. (2021). Cyber Ranges: The New Training Era in the Cybersecurity and Digital Forensics World. In: Akhgar, B., Kavallieros, D., Sdongos, E. (eds) Technology Development for Security Practitioners. Security Informatics and Law Enforcement. Springer, Cham. https://doi.org/10.1007/978-3-030-69460-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-69460-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-69459-3

  • Online ISBN: 978-3-030-69460-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics