Reference Hub12
CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems

CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems

Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Helge Janicke, Kevin Jones
ISBN13: 9781522556343|ISBN10: 1522556346|EISBN13: 9781522556350
DOI: 10.4018/978-1-5225-5634-3.ch033
Cite Chapter Cite Chapter

MLA

Hallaq, Bil, et al. "CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems." Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2018, pp. 622-637. https://doi.org/10.4018/978-1-5225-5634-3.ch033

APA

Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., & Jones, K. (2018). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. In I. Management Association (Ed.), Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 622-637). IGI Global. https://doi.org/10.4018/978-1-5225-5634-3.ch033

Chicago

Hallaq, Bil, et al. "CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems." In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 622-637. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-5634-3.ch033

Export Reference

Mendeley
Favorite

Abstract

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is detailed documentation of the decision process and the potential difficulties that need to be considered when undertaking the creation of a Cyber Range (CR) in order to facilitate the capture of labelled datasets which is included in this paper. This paper makes several further contributions; a review of Cyber Ranges created by Academic Institutions that influenced the criteria in creating CYRAN, the De Montfort University CYber RANge. The article presents the design implementation, the process of creating effective rules of engagement, the management and running of a Cyber Range Event (CRE) with partners from Industry and Academia and the creation of labelled datasets.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.