Advertisement

Design of Cyber Warfare Testbed

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 731)

Abstract

Innovations doing fine in a predictable, controlled environment may be much less effective, dependable or manageable in a production environment, more so in cyber systems, where every day there is new technology in malware detection, zero-day vulnerabilities are coming up. Considering NCSP-2013, authors propose a realistic cyber warfare testbed using XenServer hypervisor, commodity servers and open-source tools. Testbed supports cyber-attack and defence scenarios, malware containment, exercise logs and analysis to develop tactics and strategies. Further, authors provide ways and means to train cyber warriors, honing their skills as well as maturing attack and defence technologies on this testbed.

Keywords

Virtualization Hypervisor Metasploit Malware Container 

References

  1. 1.
    National Cyber Security Policy (NCSP-2013). http://deity.gov.in/content/national-cyber-security-policy-2013-1
  2. 2.
    The DETER Project. http://deter-project.org/
  3. 3.
    Emulab Software. https://www.emulab.net/
  4. 4.
  5. 5.
    Malware Analysis Service. https://malwr.com/
  6. 6.
  7. 7.
    Metasploit Community Edition. http://www.metasploit.com/
  8. 8.
  9. 9.
    Source of Malware and Malware Generation Tools. http://vxheaven.org/
  10. 10.
    Mishra, P.K.: Cyber defence: an approach to defend cyber assets. In: Proceedings of 1st National Conference on Cyber Security 2012, DIAT Pune (2012)Google Scholar
  11. 11.
    Common Vulnerabilities Scoring Scheme. https://www.first.org/cvss
  12. 12.
    Vinod P., Laxmi, V., Gaur, M.S., Chauhan, G.: Malware analysis using non-signature based method. In: Proceedings of IEEE International Conference on Network Communication and Computer, ICNCC (2011)Google Scholar
  13. 13.
    Kouril, D., et al.: Cloud-based testbed for simulation of cyber attacks. In: Proceedings of the 2014 IEEE Network Operations and Management Symposium (2014)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Institute for Systems Studies and AnalysesDefence Research and Development OrganisationNew DelhiIndia

Personalised recommendations