iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.7717/PEERJ-CS.1574
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T15:51:00Z","timestamp":1724687460371},"reference-count":43,"publisher":"PeerJ","license":[{"start":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T00:00:00Z","timestamp":1694044800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"abstract":"Cyberattacks, particularly those targeting systems that store or handle sensitive data, have become more sophisticated in recent years. To face increasing threats, continuous capacity building and digital skill competence are needed. Cybersecurity hands-on training is essential to upskill cybersecurity professionals. However, the cost of developing and maintaining a cyber range platform is high. Setting up an ideal digital environment for cybersecurity exercises can be challenging and often need to invest a lot of time and system resources in this process. In this article, we present a lightweight cyber range platform that was developed under the open-source cloud platform OpenStack, based on Docker technology using IaC methodology. Combining the advantages of Docker technology, DevOps automation capabilities, and the cloud platform, the proposed cyber range platform achieves the maximization of performance and scalability while reducing costs and resources.<\/jats:p>","DOI":"10.7717\/peerj-cs.1574","type":"journal-article","created":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T07:16:07Z","timestamp":1694070967000},"page":"e1574","source":"Crossref","is-referenced-by-count":4,"title":["A novel autonomous container-based platform for cybersecurity training and research"],"prefix":"10.7717","volume":"9","author":[{"given":"Nestoras","family":"Chouliaras","sequence":"first","affiliation":[{"name":"University of West Attica, Athens, Greece"}]},{"given":"Ioanna","family":"Kantzavelou","sequence":"additional","affiliation":[{"name":"University of West Attica, Athens, Greece"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5360-9782","authenticated-orcid":true,"given":"Leandros","family":"Maglaras","sequence":"additional","affiliation":[{"name":"School of Computer Science, Napier University, Edinburgh, United Kingdom"}]},{"given":"Grammati","family":"Pantziou","sequence":"additional","affiliation":[{"name":"University of West Attica, Athens, Greece"}]},{"given":"Mohamed","family":"Amine Ferrag","sequence":"additional","affiliation":[{"name":"Technology Innovation Institute, Abu Dhabi, UAE"}]}],"member":"4443","published-online":{"date-parts":[[2023,9,7]]},"reference":[{"issue":"6","key":"10.7717\/peerj-cs.1574\/ref-1","doi-asserted-by":"publisher","first-page":"e126","DOI":"10.1002\/spy2.126","article-title":"Game-based learning: a review of tabletop exercises for cybersecurity incident response training","volume":"3","author":"Angafor","year":"2020","journal-title":"Security and Privacy"},{"key":"10.7717\/peerj-cs.1574\/ref-2","article-title":"Red hat ansible automation platform","author":"Ansible. Red Hat, Inc","year":"2020"},{"key":"10.7717\/peerj-cs.1574\/ref-3","first-page":"1049","article-title":"Enabling container-based fog computing with openstack","author":"Benomar","year":"2019"},{"issue":"3","key":"10.7717\/peerj-cs.1574\/ref-4","doi-asserted-by":"publisher","first-page":"3011","DOI":"10.1007\/s10639-021-10704-y","article-title":"Changing the landscape of cybersecurity education in the EU: will the new approach produce the required cybersecurity skills?","volume":"27","author":"Bla\u017ei\u010d","year":"2022","journal-title":"Education and Information Technologies"},{"key":"10.7717\/peerj-cs.1574\/ref-5","article-title":"Check point research: cyber attacks increased 50 percent year over year","author":"Check Point Software and Technologies Ltd","year":"2022"},{"key":"10.7717\/peerj-cs.1574\/ref-6","article-title":"Empirical evaluation of state-of-the-art penetration tools","author":"Chouliaras","year":"2017"},{"issue":"4","key":"10.7717\/peerj-cs.1574\/ref-7","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.3390\/app11041809","article-title":"Cyber ranges and TestBeds for education, training, and research","volume":"11","author":"Chouliaras","year":"2021","journal-title":"Applied Sciences"},{"issue":"2","key":"10.7717\/peerj-cs.1574\/ref-8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCWT","article-title":"Scips: using experiential learning to raise cyber situational awareness in industrial control system","volume":"7","author":"Cook","year":"2017","journal-title":"International Journal of Cyber Warfare and Terrorism (IJCWT)"},{"issue":"1","key":"10.7717\/peerj-cs.1574\/ref-9","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MSP.2015.17","article-title":"Thinking about cybersecurity","volume":"13","author":"Dark","year":"2015","journal-title":"IEEE Security & Privacy"},{"key":"10.7717\/peerj-cs.1574\/ref-10","first-page":"1","article-title":"Building a cyber range for training CyberDefense situation awareness","author":"Debatty","year":"2019"},{"issue":"4","key":"10.7717\/peerj-cs.1574\/ref-11","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MSP.2013.83","article-title":"Computer security competitions: expanding educational outcomes","volume":"11","author":"Eagle","year":"2013","journal-title":"IEEE Security & Privacy"},{"key":"10.7717\/peerj-cs.1574\/ref-12","article-title":"Call for participation in Panoptis 2022 cyber defence exercise","author":"Ellak","year":"2022"},{"key":"10.7717\/peerj-cs.1574\/ref-13","article-title":"Cyber Europe 2022","author":"ENISA","year":"2022"},{"key":"10.7717\/peerj-cs.1574\/ref-14","article-title":"Understanding cyber ranges: from hype to reality","author":"European Cyber Security Organisation (ECSO)","year":"2020"},{"key":"10.7717\/peerj-cs.1574\/ref-15","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2010.15394","article-title":"Smart homes: security challenges and privacy concerns","author":"Hall","year":"2020","journal-title":"ArXiv preprint"},{"key":"10.7717\/peerj-cs.1574\/ref-16","article-title":"Information sharing and analysis centres EU","author":"ISACs EU","year":"2022"},{"key":"10.7717\/peerj-cs.1574\/ref-17","article-title":"Cyberdrills","author":"ITU","year":"2022"},{"issue":"14\u201315","key":"10.7717\/peerj-cs.1574\/ref-18","doi-asserted-by":"publisher","first-page":"e791","DOI":"10.7717\/peerj-cs.791","article-title":"A multiplayer game model to detect insiders in wireless sensor networks","volume":"8","author":"Kantzavelou","year":"2022","journal-title":"PeerJ Computer Science"},{"key":"10.7717\/peerj-cs.1574\/ref-19","doi-asserted-by":"crossref","article-title":"Detecting intrusive activities from insiders in a wireless sensor network using game theory","author":"Kantzavelou","year":"2013","DOI":"10.1145\/2504335.2504350"},{"issue":"1","key":"10.7717\/peerj-cs.1574\/ref-20","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1108\/ICS-04-2019-0050","article-title":"Adapting CTF challenges into virtual cybersecurity learning environments","volume":"29","author":"Karagiannis","year":"2020","journal-title":"Information & Computer Security"},{"issue":"8","key":"10.7717\/peerj-cs.1574\/ref-21","doi-asserted-by":"publisher","first-page":"318","DOI":"10.3390\/info12080318","article-title":"PocketCTF: a fully featured approach for hosting portable attack and defense cybersecurity exercises","volume":"12","author":"Karagiannis","year":"2021","journal-title":"Information-an International Interdisciplinary Journal"},{"key":"10.7717\/peerj-cs.1574\/ref-22","doi-asserted-by":"crossref","article-title":"Building open source cyber range to teach cyber security","author":"Lieskovan","year":"2021","DOI":"10.1145\/3465481.3469188"},{"key":"10.7717\/peerj-cs.1574\/ref-23","first-page":"1019","article-title":"Performance evaluation for deploying docker containers on baremetal and virtual machine","author":"Lingayat","year":"2018"},{"key":"10.7717\/peerj-cs.1574\/ref-24","first-page":"449","article-title":"Process mining analysis of puzzle-based cybersecurity training","volume":"1","author":"Macak","year":"2022"},{"key":"10.7717\/peerj-cs.1574\/ref-25","first-page":"1","article-title":"Cybersecurity in the era of digital transformation: the case of Greece","author":"Maglaras","year":"2020"},{"key":"10.7717\/peerj-cs.1574\/ref-26","doi-asserted-by":"crossref","volume-title":"Cybersecurity issues in emerging technologies","author":"Maglaras","year":"2021","DOI":"10.1201\/9781003109952"},{"key":"10.7717\/peerj-cs.1574\/ref-27","article-title":"How tech companies can help solve the cybersecurity skills shortage. Forbes","author":"McCartey","year":"2022"},{"key":"10.7717\/peerj-cs.1574\/ref-28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3101245","article-title":"Cyexec*: a high-performance container-based cyber range with scenario randomization","volume":"9","author":"Nakata","year":"2021","journal-title":"IEEE Access"},{"key":"10.7717\/peerj-cs.1574\/ref-29","article-title":"The cyber range\u2014a guide (NIST-NICE)","author":"NIST","year":"2018"},{"key":"10.7717\/peerj-cs.1574\/ref-30","article-title":"wp-includes\/class-wp-xmlrpc-server.php in wordpress before 5.5.2 allows attackers to gain privileges by using xml-rpc to comment on a post","author":"NIST CVE-2020-28036","year":"2020"},{"key":"10.7717\/peerj-cs.1574\/ref-31","article-title":"Openstack","author":"Openstack","year":"2023"},{"key":"10.7717\/peerj-cs.1574\/ref-32","article-title":"Foundation of cyber ranges","author":"Podnar","year":"2021"},{"key":"10.7717\/peerj-cs.1574\/ref-33","article-title":"Kolla ansible documentation","author":"Rackspace Cloud Computing","year":"2023"},{"key":"10.7717\/peerj-cs.1574\/ref-34","first-page":"1","article-title":"The concept of cyber defence exercises (CDX): planning, execution, evaluation","author":"Seker","year":"2018"},{"issue":"4","key":"10.7717\/peerj-cs.1574\/ref-35","doi-asserted-by":"publisher","first-page":"3421","DOI":"10.1007\/s10586-021-03337-w","article-title":"Implementation and evaluation of a container management platform on docker: hadoop deployment as an example","volume":"24","author":"Shih","year":"2021","journal-title":"Cluster Computing"},{"key":"10.7717\/peerj-cs.1574\/ref-36","first-page":"172","article-title":"Development of training system and practice contents for cybersecurity education","author":"Shin","year":"2019"},{"key":"10.7717\/peerj-cs.1574\/ref-37","first-page":"1353","article-title":"Labtainers cyber exercises: building and deploying fully provisioned cyber labs that run on a laptop","author":"Thompson","year":"2021"},{"key":"10.7717\/peerj-cs.1574\/ref-38","article-title":"Swedish Coop supermarkets shut due to US ransomware cyber-attack. BBC","author":"Tidy","year":"2022"},{"key":"10.7717\/peerj-cs.1574\/ref-39","article-title":"The cybersecurity team of UNIWA in the 3rd place of the world competition","author":"University of West Attica","year":"2022"},{"issue":"3","key":"10.7717\/peerj-cs.1574\/ref-40","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1109\/TLT.2022.3216345","article-title":"Smart environment for adaptive learning of cybersecurity skills","volume":"16","author":"Vykopal","year":"2022","journal-title":"IEEE Transactions on Learning Technologies"},{"key":"10.7717\/peerj-cs.1574\/ref-41","first-page":"1","article-title":"Scalable learning environments for teaching cybersecurity hands-on","author":"Vykopal","year":"2021"},{"key":"10.7717\/peerj-cs.1574\/ref-42","article-title":"Damn vulnerable web application (DVWA). GitHub","author":"Wood","year":"2022"},{"issue":"8","key":"10.7717\/peerj-cs.1574\/ref-43","doi-asserted-by":"publisher","first-page":"2282","DOI":"10.1109\/TLA.2018.8528247","article-title":"Performance comparison between virtual machines and docker containers","volume":"16","author":"Yadav","year":"2018","journal-title":"IEEE Latin America Transactions"}],"container-title":["PeerJ Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/peerj.com\/articles\/cs-1574.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1574.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1574.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/peerj.com\/articles\/cs-1574.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T07:16:17Z","timestamp":1694070977000},"score":1,"resource":{"primary":{"URL":"https:\/\/peerj.com\/articles\/cs-1574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,7]]},"references-count":43,"alternative-id":["10.7717\/peerj-cs.1574"],"URL":"https:\/\/doi.org\/10.7717\/peerj-cs.1574","archive":["CLOCKSS","LOCKSS","Portico"],"relation":{},"ISSN":["2376-5992"],"issn-type":[{"value":"2376-5992","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,9,7]]},"article-number":"e1574"}}