Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Reference Hub1
Bil Hallaq, Andrew Nicholson, Richard Smith, Leandros Maglaras, Helge Janicke, Kevin Jones
ISBN13: 9781522518297|ISBN10: 1522518290|EISBN13: 9781522518303
DOI: 10.4018/978-1-5225-1829-7.ch012
Cite Chapter Cite Chapter

MLA

Hallaq, Bil, et al. "CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems." Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, IGI Global, 2017, pp. 226-241. https://doi.org/10.4018/978-1-5225-1829-7.ch012

APA

Hallaq, B., Nicholson, A., Smith, R., Maglaras, L., Janicke, H., & Jones, K. (2017). CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems. In M. Ferrag & A. Ahmim (Eds.), Security Solutions and Applied Cryptography in Smart Grid Communications (pp. 226-241). IGI Global. https://doi.org/10.4018/978-1-5225-1829-7.ch012

Chicago

Hallaq, Bil, et al. "CYRAN: A Hybrid Cyber Range for Testing Security on ICS/SCADA Systems." In Security Solutions and Applied Cryptography in Smart Grid Communications, edited by Mohamed Amine Ferrag and Ahmed Ahmim, 226-241. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1829-7.ch012

Export Reference

Mendeley
Favorite

Abstract

Cyber Security of ICS/SCADA systems is a major aspect of current research focus. Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real SCADA systems with low costs. Significantly lacking from current research, is detailed documentation of the decision process and the potential difficulties that need to be considered when undertaking the creation of a Cyber Range (CR) in order to facilitate the capture of labelled datasets which is included in this paper. This paper makes several further contributions; a review of Cyber Ranges created by Academic Institutions that influenced the criteria in creating CYRAN, the De Montfort University CYber RANge. The article presents the design implementation, the process of creating effective rules of engagement, the management and running of a Cyber Range Event (CRE) with partners from Industry and Academia and the creation of labelled datasets.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.