Home > Research > Publications & Outputs > Enabling exercises, education and research with...

Associated organisational unit

View graph of relations

Enabling exercises, education and research with a comprehensive cyber range

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Enabling exercises, education and research with a comprehensive cyber range. / Leitner, Maria; Frank, Maximilian; Langner, Gregor et al.
In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 12, No. 4, 4, 31.12.2021, p. 37-61.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Leitner, M, Frank, M, Langner, G, Landauer, M, Skopik, F, Smith, P, Akhras, B, Hotwagner, W, Kucek, S, Pahi, T, Reuter, L & Warum, M 2021, 'Enabling exercises, education and research with a comprehensive cyber range', Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 12, no. 4, 4, pp. 37-61. https://doi.org/10.22667/JOWUA.2021.12.31.037

APA

Leitner, M., Frank, M., Langner, G., Landauer, M., Skopik, F., Smith, P., Akhras, B., Hotwagner, W., Kucek, S., Pahi, T., Reuter, L., & Warum, M. (2021). Enabling exercises, education and research with a comprehensive cyber range. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, 12(4), 37-61. Article 4. https://doi.org/10.22667/JOWUA.2021.12.31.037

Vancouver

Leitner M, Frank M, Langner G, Landauer M, Skopik F, Smith P et al. Enabling exercises, education and research with a comprehensive cyber range. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2021 Dec 31;12(4):37-61. 4. doi: 10.22667/JOWUA.2021.12.31.037

Author

Leitner, Maria ; Frank, Maximilian ; Langner, Gregor et al. / Enabling exercises, education and research with a comprehensive cyber range. In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 2021 ; Vol. 12, No. 4. pp. 37-61.

Bibtex

@article{964517ff16d748b18987176c5de65d29,
title = "Enabling exercises, education and research with a comprehensive cyber range",
abstract = "With the continuous rise of threat actors and attacks, it is even more imminent to create cyber ranges, for example as training and exercise environment, that contribute to the modern challenges of a digital society. New digital environments are needed to tackle information security and cyber security challenges. In the past 15 years, virtual environments that simulate a diverse set of information technology (IT) and operational technology (OT) infrastructures, further called cyber ranges, have been developed. These virtual platforms provide the operations of exercises, training, research and other activities. The sum of these activities contribute to science and strengthen the practice of organizations. In this paper, we introduce the design and implementation of the AIT Cyber Range and outline its building blocks: computing platform, infrastructure provisioning, software provisioning and scenario engine. Furthermore, we describe five use cases: cyber exercises, training as well as security research and development on industrial control systems and intrusion detection systems. For future work, we aim to address federation and interoperability with other cyber ranges.",
author = "Maria Leitner and Maximilian Frank and Gregor Langner and Max Landauer and Florian Skopik and Paul Smith and Benjamin Akhras and Wolfgang Hotwagner and Stela Kucek and Timea Pahi and Lenhard Reuter and Manuel Warum",
year = "2021",
month = dec,
day = "31",
doi = "10.22667/JOWUA.2021.12.31.037",
language = "English",
volume = "12",
pages = "37--61",
journal = "Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications",
issn = "2093-5374",
publisher = "Innovative Information Science & Technology Research Group (ISYOU)",
number = "4",

}

RIS

TY - JOUR

T1 - Enabling exercises, education and research with a comprehensive cyber range

AU - Leitner, Maria

AU - Frank, Maximilian

AU - Langner, Gregor

AU - Landauer, Max

AU - Skopik, Florian

AU - Smith, Paul

AU - Akhras, Benjamin

AU - Hotwagner, Wolfgang

AU - Kucek, Stela

AU - Pahi, Timea

AU - Reuter, Lenhard

AU - Warum, Manuel

PY - 2021/12/31

Y1 - 2021/12/31

N2 - With the continuous rise of threat actors and attacks, it is even more imminent to create cyber ranges, for example as training and exercise environment, that contribute to the modern challenges of a digital society. New digital environments are needed to tackle information security and cyber security challenges. In the past 15 years, virtual environments that simulate a diverse set of information technology (IT) and operational technology (OT) infrastructures, further called cyber ranges, have been developed. These virtual platforms provide the operations of exercises, training, research and other activities. The sum of these activities contribute to science and strengthen the practice of organizations. In this paper, we introduce the design and implementation of the AIT Cyber Range and outline its building blocks: computing platform, infrastructure provisioning, software provisioning and scenario engine. Furthermore, we describe five use cases: cyber exercises, training as well as security research and development on industrial control systems and intrusion detection systems. For future work, we aim to address federation and interoperability with other cyber ranges.

AB - With the continuous rise of threat actors and attacks, it is even more imminent to create cyber ranges, for example as training and exercise environment, that contribute to the modern challenges of a digital society. New digital environments are needed to tackle information security and cyber security challenges. In the past 15 years, virtual environments that simulate a diverse set of information technology (IT) and operational technology (OT) infrastructures, further called cyber ranges, have been developed. These virtual platforms provide the operations of exercises, training, research and other activities. The sum of these activities contribute to science and strengthen the practice of organizations. In this paper, we introduce the design and implementation of the AIT Cyber Range and outline its building blocks: computing platform, infrastructure provisioning, software provisioning and scenario engine. Furthermore, we describe five use cases: cyber exercises, training as well as security research and development on industrial control systems and intrusion detection systems. For future work, we aim to address federation and interoperability with other cyber ranges.

U2 - 10.22667/JOWUA.2021.12.31.037

DO - 10.22667/JOWUA.2021.12.31.037

M3 - Journal article

VL - 12

SP - 37

EP - 61

JO - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

JF - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications

SN - 2093-5374

IS - 4

M1 - 4

ER -