Analysis of the implementation of an interactive kinetic cyber range component

Brendan Lawless, Jason Flood, Anthony Keane

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Abstract

    Securing the operational resilience of devices within the Internet of Everything (IOE) requires new and innovative approaches to cyber threats. One approach is to allow end-users to personally experience the impact of an attack on any IOE component using a scale model of a personal, corporate or national infrastructure using a Cyber Range. This paper looks at the implementation of individual Cyber Range components and analyses the methodologies and tools of the attacks on the components from Cyber Challenge CTF competitions.

    Original languageEnglish
    Title of host publication14th European Conference on Cyber Warfare and Security, ECCWS 2015
    EditorsNasser Abouzakhar
    PublisherCurran Associates Inc.
    Pages389-394
    Number of pages6
    ISBN (Electronic)9781910810286
    Publication statusPublished - 2015
    Event14th European Conference on Cyber Warfare and Security, ECCWS 2015 - Hatfield, United Kingdom
    Duration: 2 Jul 20153 Jul 2015

    Publication series

    NameEuropean Conference on Information Warfare and Security, ECCWS
    Volume2015-January
    ISSN (Print)2048-8602
    ISSN (Electronic)2048-8610

    Conference

    Conference14th European Conference on Cyber Warfare and Security, ECCWS 2015
    Country/TerritoryUnited Kingdom
    CityHatfield
    Period2/07/153/07/15

    Keywords

    • Analysis
    • Attack
    • Cyber
    • Cyber-range
    • Kinetic

    Fingerprint

    Dive into the research topics of 'Analysis of the implementation of an interactive kinetic cyber range component'. Together they form a unique fingerprint.

    Cite this