Professional Documents
Culture Documents
On-Demand Deployment and Orchestration of Cyber Ranges in The Cloud
On-Demand Deployment and Orchestration of Cyber Ranges in The Cloud
Research Team
- Environment isolation
- Remote access management
- Cyber ranges deploy automation
- Security
- Accountability
System architecture
The system is composed of four main components :
- Cluster Security Controller : carries out real-time checks on the resources of the
Cyber Range Environment and takes decisions in case of anomalies (e.g. resource
termination, access policy changes)
Cyber Range Environment
The elements of the Cyber Range Environment set are divided in multiple
subsets.
G. Perrone, S. P. Romano. The Docker Security Playground: A hands-on approach to the study of network security. 2017
Principles, Systems and Applications of IP Telecommunications (IPTComm), Chicago, IL, 2017, pp. 1-8.
A reproducible Hybrid Micro Range
F. Caturano, G. Perrone, S.P. Romano. Capturing flags in a dynamically deployed microservices-based heterogeneus
environment. 2020 Principles, Systems and Applications of IP Telecommunications (IPTComm), Chicago, IL, 2020
Remote Access Controller
User traffic is routed to the assigned Micro Ranges through client specific rules
and access policies of the OpenVPN Server
- Deployment of comprehensive cyber arenas other than the classical cyber ranges, providing
internet protocols emulation functionality
- Deployment of cyber ranges (and cyber arenas) with orchestrators such as AWS
Cloudformation