[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/MILCOM.2014.27guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

National Cyber Range Overview

Published: 06 October 2014 Publication History

Abstract

The National Cyber Range (NCR) is an innovative Department of Defense (DoD) resource originally established by the Defense Advanced Research Projects Agency (DARPA) and now under the purview of the Test Resource Management Center (TRMC). It provides a unique environment for cyber security testing throughout the program development life cycle using unique methods to assess resiliency to advanced cyberspace security threats. This paper describes what a cyber security range is, how it might be employed, and the advantages a program manager (PM) can gain in applying the results of range events. Creating realism in a test environment isolated from the operational environment is a special challenge in cyberspace. Representing the scale and diversity of the complex DoD communications networks at a fidelity detailed enough to realistically portray current and anticipated attack strategies (e.g., Malware, distributed denial of service attacks, cross-site scripting) is complex. The NCR addresses this challenge by representing an Internet-like environment by employing a multitude of virtual machines and physical hardware augmented with traffic emulation, port/protocol/service vulnerability scanning, and data capture tools. Coupled with a structured test methodology, the PM can efficiently and effectively engage with the Range to gain cyberspace resiliency insights. The NCR capability, when applied, allows the DoD to incorporate cyber security early to avoid high cost integration at the end of the development life cycle. This paper provides an overview of the resources of the NCR which may be especially helpful for DoD PMs to find the best approach for testing the cyberspace resiliency of their systems under development.

Cited By

View all
  • (2024)Cybersecurity training and healthcare: the AERAS approachInternational Journal of Information Security10.1007/s10207-023-00802-y23:2(1527-1539)Online publication date: 1-Apr-2024
  • (2023)Enhancing Cyber Security Education and Training through GamificationProceedings of the 2nd International Conference of the ACM Greek SIGCHI Chapter10.1145/3609987.3610016(1-5)Online publication date: 27-Sep-2023
  • (2023)Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware DetectorsDigital Threats: Research and Practice10.1145/35674324:2(1-22)Online publication date: 10-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
MILCOM '14: Proceedings of the 2014 IEEE Military Communications Conference
October 2014
1718 pages
ISBN:9781479967704

Publisher

IEEE Computer Society

United States

Publication History

Published: 06 October 2014

Author Tags

  1. cyberspace
  2. range
  3. security
  4. test

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Cybersecurity training and healthcare: the AERAS approachInternational Journal of Information Security10.1007/s10207-023-00802-y23:2(1527-1539)Online publication date: 1-Apr-2024
  • (2023)Enhancing Cyber Security Education and Training through GamificationProceedings of the 2nd International Conference of the ACM Greek SIGCHI Chapter10.1145/3609987.3610016(1-5)Online publication date: 27-Sep-2023
  • (2023)Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware DetectorsDigital Threats: Research and Practice10.1145/35674324:2(1-22)Online publication date: 10-Aug-2023
  • (2022)Verification of Cyber Emulation Experiments Through Virtual Machine and Host MetricsProceedings of the 15th Workshop on Cyber Security Experimentation and Test10.1145/3546096.3546115(71-80)Online publication date: 8-Aug-2022
  • (2021)Reproducible and Adaptable Log Data Generation for Sound Cybersecurity ExperimentsProceedings of the 37th Annual Computer Security Applications Conference10.1145/3485832.3488020(690-705)Online publication date: 6-Dec-2021
  • (2021)Comparing reproduced cyber experimentation studies across different emulation testbedsProceedings of the 14th Cyber Security Experimentation and Test Workshop10.1145/3474718.3474725(63-71)Online publication date: 9-Aug-2021
  • (2020)Mapping approach for multiscale emulation networks in heterogeneous environmentsProceedings of the 2020 International Conference on Cyberspace Innovation of Advanced Technologies10.1145/3444370.3444595(342-347)Online publication date: 4-Dec-2020
  • (2020)Integrating digital twin security simulations in the security operations centerProceedings of the 15th International Conference on Availability, Reliability and Security10.1145/3407023.3407039(1-9)Online publication date: 25-Aug-2020
  • (2019)TritonProceedings of the 12th USENIX Conference on Cyber Security Experimentation and Test10.5555/3359012.3359015(3-3)Online publication date: 12-Aug-2019

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media