Submitted:
20 June 2024
Posted:
21 June 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Related Works
2.1. VM based Cyber Ranges
2.2. Container Based and Hybrid Cyber Ranges
2.3. Frameworks and Overview
3. Design of the GoibhniUWE Cyber Range
- - Ease of deployment: The cyber range should be easy to deploy with minimal resource overhead.
- - Modular: The cyber range should support the ability to easily swap out different vulnerable services depending on the desired scenario.
- - Real-time: The cyber range should support real-time monitoring and logging from multiple sources.
- - Scalability: The cyber range should support the ability to scale up the infrastructure as required by the deployed scenario.


4. Experimentation
- T1 (10 containers - No pull or logging): 9 vulnerable service containers with the required AttackBox running. All container images were on the host system.
- T2 (10 containers - Pull and full logging): 4 vulnerable service containers with the required AttackBox and full logging. All container images were downloaded during scenario deployment.
- T3 (10 containers - Full logging and random traffic): 3 vulnerable service containers with the required AttackBox, RandomTraffic and full logging. All container images were on the host system.
- T4 (16 containers - Full logging): 10 vulnerable service containers with the required AttackBox and full logging. All container images were on the host system.
- T5 (12 containers - CTF): 11 vulnerable services and the required AttackBox. No logging and all container images were on the host system. The CTF ran for 8 hours and the deployed services were being targeted by up to 12 external attackers at a time.
5. Results and Discussion
| Scenario | CPU Usage (%) | Memory Usage (GB) | Startup Time |
|---|---|---|---|
| T1 | 11.34 | 3.18 | 19 s |
| T2 | 29.87 | 3.21 | 11 m 34 s |
| T3 | 27.64 | 3.28 | 5 m 43 s |
| T4 | 28.96 | 5.06 | 5 m 48 s |
| T5 | 45.66 | 4.22 | 20 s |
- - Ease of deployment: Even during continuous, active usage the deployment averaged less 2 CPU processors and 5.1GB of memory.
- - Modular: Running conditions and deployments could be easily altered in a repeatable fashion
- - Real-time: Real-time monitoring and logging from multiple sources could be enabled and utilised
- - Scalability: The number of vulnerable services could be increased and deployments could be actively targeted by multiple external attackers
5.1. Limitations
- Host OS. Currently GoibhniUWE is limited to deployment on Linux based hosts and therefore Linux based target architectures. The use of containerisation should make the transition to Windows and MacOS hosts relatively straight forward, however this has not been fully explored to date.
- Manual engagements and attack modelling. While the setup of the target environment and container architecture itself is automated, the role of the attacker is a manual process which is carried out by the end user. Though this does offer a degree of flexibility for experienced users it does leave a gap in the ranges offering, as some VM based cyber ranges do provide automated attacks (or simulations) through tools such as AtomicRedTeam2.
- Log exporting. Currently the traffic capture and IDS logs are saved locally to the host machine (IDS logs are also consumed by the Elastic stack). However the collated Elastic logging, which includes all container logs and IDS logging, needs to be manually exported via elasticdump3.
6. Conclusions and Further Work
Author Contributions
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- DetectionLab. Introduction: DetectionLab. 2023. Available online: https://www.detectionlab.network/ (accessed on 6 February 2024).
- Splunk Threat Research Team. Attack Range v3.0 | Splunk. 2023. Available online: https://www.splunk.com/en_us/blog/security/attack-range-v3-0.html (accessed on 6 February 2024).
- Atomic Red Team. Explore Atomic Red Team. 2023. Available online: https://atomicredteam.io/ (accessed on 6 March 2024).
- Yamin, M.M.; Katt, B. Modeling and executing cyber security exercise scenarios in cyber ranges. Computers & Security 2022, 116, 102635. [Google Scholar]
- Leitner, M.; Frank, M.; Hotwagner, W.; Langner, G.; Maurhart, O.; Pahi, T.; Reuter, L.; Skopik, F.; Smith, P.; Warum, M. AIT cyber range: flexible cyber security environment for exercises, training and research. In Proceedings of the European Interdisciplinary Cybersecurity Conference; 2020; pp. 1–6. [Google Scholar]
- Vykopal, J.; Čeleda, P.; Seda, P.; Švábenskỳ, V.; Tovarňák, D. Scalable learning environments for teaching cybersecurity hands-on. 2021 IEEE Frontiers in Education Conference (FIE); IEEE, 2021; pp. 1–9. [Google Scholar]
- Beuran, R.; Tang, D.; Pham, C.; Chinen, K.i.; Tan, Y.; Shinoda, Y. Integrated framework for hands-on cybersecurity training: CyTrONE. Computers & Security 2018, 78, 43–59. [Google Scholar]
- Pham, C.; Tang, D.; Chinen, K.i.; Beuran, R. Cyris: A cyber range instantiation system for facilitating security training. In Proceedings of the Seventh Symposium on Information and Communication Technology; 2016; pp. 251–258. [Google Scholar]
- Oh, S.K.; Stickney, N.; Hawthorne, D.; Matthews, S.J. Teaching Web-Attacks on a Raspberry Pi Cyber Range. In Proceedings of the 21st Annual Conference on Information Technology Education; Association for Computing Machinery: New York, NY, USA, 2020. SIGITE’20. pp. 324–329. [Google Scholar]
- Nakata, R.; Otsuka, A. CyExec*: A High-Performance Container-Based Cyber Range With Scenario Randomization. IEEE Access 2021, 9, 109095–109114. [Google Scholar] [CrossRef]
- Rapid7. Metasploitable 2. Available online: https://docs.rapid7.com/metasploit/metasploitable-2/ (accessed on 4 November 2023).
- Cisco. Snort. Available online: https://www.snort.org/ (accessed on 4 November 2023).
- Chouliaras, N.; Kantzavelou, I.; Maglaras, L.; Pantziou, G.; Ferrag, M.A. A novel autonomous container-based platform for cybersecurity training and research. PeerJ Computer Science 2023, 9, e1574. [Google Scholar] [CrossRef]
- Katsantonis, M.; Manikas, A.; Mavridis, I.; Gritzalis, D. Cyber range design framework for cyber security education and training. International Journal of Information Security 2023, 1–23. [Google Scholar] [CrossRef]
- Ukwandu, E.; Farah, M.A.B.; Hindy, H.; Brosset, D.; Kavallieros, D.; Atkinson, R.; Tachtatzis, C.; Bures, M.; Andonovic, I.; Bellekens, X. A review of cyber-ranges and test-beds: Current and future trends. Sensors 2020, 20, 7148. [Google Scholar] [CrossRef] [PubMed]
- vulhub. Pre-Built Vulnerable Environments Based on Docker-Compose. 2023. Available online: https://github.com/vulhub/vulhub (accessed on 6 November 2023).
- MITRE Corporation. CWE - New to CWE. 2023. Available online: https://cwe.mitre.org/about/new_to_cwe.html (accessed on 6 February 2024).
- Schreuders, Z.C.; Shaw, T.; Shan-A-Khuda, M.; Ravichandran, G.; Keighley, J.; Ordean, M. Security Scenario Generator (SecGen): A Framework for Generating Randomly Vulnerable Rich-scenario VMs for Learning Computer Security and Hosting CTF Events. 2017 USENIX Workshop on Advances in Security Education (ASE 17); USENIX Association, 2017. [Google Scholar]
- Corporation, M. Earth Lusca, TAG 22, Group 1006 | MITRE- ATT&CK. 2022. Available online: https://attack.mitre.org/groups/G1006/ (accessed on 6 March 2023).
| 1 | |
| 2 | |
| 3 |





| MITRE ATT&CK TTP | Action | Target |
|---|---|---|
| Active Scanning: Vulnerability Scanning - T1595.002 | Use of Nmap, dirb and Nikto | Python Flask server |
| Exploit Public-Facing Application - T1190 | Reverse shell via crafted upload | Python Flask server (Ghostscript) |
| Compromise Infrastructure - T1584 & Remote System Discovery - T1018 | Use of compromised Flask server to launch further reconnaissance and attacks | Internal services (CouchDB and Jenkins) |
| Command and Scripting Interpreter: Python - Port scanning - T1059.006 | Crafted python scripts for port scanning and exploitation | CouchDB (CVE-2022-24706) |
| Logging Source and Index | Average | Min | Max |
|---|---|---|---|
| Filebeats | 118 | 3122 | 10 |
| Packetbeats | 524 | 9169 | 26 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).