Abstract
Deploying the appropriate digital environment for conducting cybersecurity exercises can be challenging and typically requires a lot of effort and system resources. Usually, for deploying vulnerable webservices and setting up labs for hands-on cybersecurity exercises to take place, more configuration is required along with technical expertise. Containerization techniques and solutions provide less overhead and can be used instead of virtualization techniques to revise the existing approaches. Furthermore, it is important to sandbox or replicate existing systems or services for the cybersecurity exercises to be realistic. To address such challenges, we conducted a performance evaluation of some of the existing deployment techniques to analyze their benefits and drawbacks. We tested techniques relevant to containerization or MicroVMs that include less overhead instead of the regular virtualization techniques to provide meaningful and comparable results from the deployment of scalable solutions, demonstrating their benefits and drawbacks. Towards this direction, we present a use case for deploying cybersecurity exercises that requires less effort and moderate system resources. By using the deployed components, we provide a baseline proposal for monitoring the progress of the participants using a host-based intrusion system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
- 14.
- 15.
- 16.
- 17.
- 18.
- 19.
References
Childers, N., et al.: Organizing large scale hacking competitions. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 132–152. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14215-4_8
Irvine, C.E., Michael, F., Khosalim, J.: Labtainers: a framework for parameterized cybersecurity labs using containers(2017)
Schreuders, Z.C., Shaw, T., Shan-A-Khuda, M., Ravichandran, G., Keighley, J., Or-dean, M.: Security scenario generator (SecGen): a framework for generating randomly vulnerable rich-scenario VMs for learning computer security and hosting CTF events. In: ASE 2017 (2017)
Hay, B., Dodge, R., Nance, K.: Using virtualization to create and deploy computer security lab exercises. In: Jajodia, S., Samarati, P., Cimato, S. (eds.) SEC 2008. ITIFIP, vol. 278, pp. 621–635. Springer, Boston, MA (2008). https://doi.org/10.1007/978-0-387-09699-5_40
Tsiakas, K., Abujelala, M., Rajavenkatanarayanan, A., Makedon, F.: User skill assessment using informative interfaces for personalized robot-assisted training. In: Zaphiris, P., Ioannou, A. (eds.) LCT 2018. LNCS, vol. 10925, pp. 88–98. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-91152-6_7
Furnell, S., Fischer, P., Finch, A.: Can’t get the staff? The growing need for cyber-security skills. Comput. Fraud Secur. 2017, 5–10 (2017)
Burley, D.L.: Special section: Cybersecurity education, Part 2. ACM Inroads. 6, 58–59 (2015)
Baldassarre, M.T., Barletta, V.S., Caivano, D., Raguseo, D., Scalera, M.: Teaching cyber security: the hack-space integrated model. In: CEUR Workshop Proceedings, vol. 2315 (2019)
Zimmerman, C.: Cybersecurity Operations Center (2014)
Debatty, T., Mees, W.: Building a cyber range for training CyberDefense situation awareness. In: 2019 International Conference on Military Communications and Information Systems, ICMCIS 2019, pp. 1–6 (2019)
Beltran, M., Calvo, M., Gonzalez, S.: Experiences using capture the flag competitions to introduce gamification in undergraduate computer security labs. In: Proceedings - 2018 International Conference on Computational Science and Computational Intelligence, CSCI 2018, pp. 574–579 (2018)
Thompson, M.F., Irvine, C.E.: Individualizing cybersecurity lab exercises with labtainers. IEEE Secur. Priv. 16, 91–95 (2018)
AlSalamah, A.K., Cámara, J.M.S., Kelly, S.: Applying virtualization and containerization techniques in cybersecurity education. In: Proceedings of the 34th Information Systems Education Conference, ISECON 2018, pp. 1–14 (2018)
Perrone, G., Romano, S.P.: The docker security playground: a hands-on approach to the study of network security. In: 2017 Principles, Systems and Applications of IP Tele-communications, IPTComm 2017, September 2017, pp. 1–8 (2017)
Yin, Y., Shao, Y., Wang, X., Su, Q.: A flexible cyber security experimentation plat-form architecture based on docker. In: Proceedings - Companion of the 19th IEEE Inter-national Conference on Software Quality, Reliability and Security, QRS-C 2019, pp. 413–420 (2019)
Du, W.: SEED: hands-on lab exercises for computer security education. IEEE Secur. Priv. 9, 70–73 (2011)
Baillie, C., Standen, M., Schwartz, J., Docking, M., Bowman, D., Kim, J.: CybORG: an autonomous cyber operations research gym (2020)
Costa, G., Russo, E., Armando, A.: Automating the generation of cyber range virtual scenarios with VSDL (2020)
Chaskos, E.C.: Cyber-security training: a comparative analysis of cyber- ranges and emerging trends, 78 (2019)
Vykopal, J., Vizvary, M., Oslejsek, R., Celeda, P., Tovarnak, D.: Lessons learned from complex hands-on defence exercises in a cyber range. In: Proceedings - Frontiers in Education Conference, FIE, October 2017, pp. 1–8 (2017)
Jamalpur, S., Navya, Y.S., Raja, P., Tagore, G., Rao, G.R.K.: Dynamic malware analysis using cuckoo sandbox. In: Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2018, pp. 1056–1060 (2018)
Keahey, K., Doering, K., Foster, I.: From sandbox to playground: dynamic virtual environments in the grid. In: Proceedings - IEEE/ACM International Workshop on Grid Computing, vol. 3, pp. 34–42 (2004)
Acknowledgments
This work is performed as part of the SPHINX project that has received funding from the European Union’s Horizon 2020 research and innovation program under grant agreement No. 826183 on Digital Society, Trust & Cyber Security E-Health, Well-being, and Ageing. The funding body have not participated in the elaboration of this research paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Karagiannis, S., Magkos, E., Ntantogian, C., Ribeiro, L.L. (2020). Sandboxing the Cyberspace for Cybersecurity Education and Learning. In: Boureanu, I., et al. Computer Security. ESORICS 2020. Lecture Notes in Computer Science(), vol 12580. Springer, Cham. https://doi.org/10.1007/978-3-030-66504-3_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-66504-3_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66503-6
Online ISBN: 978-3-030-66504-3
eBook Packages: Computer ScienceComputer Science (R0)