Disentangled Orchestration on Cyber Ranges

被引:0
|
作者
Fu, Yongquan [1 ]
Han, Weihong [2 ]
Yuan, Dong [3 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Natl Key Lab Parallel & Distributed Comp, Changsha 410073, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Cyber Engn, Guangzhou 511370, Guangdong, Peoples R China
[3] Univ Sydney, Fac Engn, Sydney, NSW 2050, Australia
基金
中国国家自然科学基金;
关键词
Task analysis; Containers; Behavioral sciences; Delays; Testing; Chatbots; Malware; Composition; event chaining; experiment; orchestration; cyber range;
D O I
10.1109/TDSC.2023.3303888
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber ranges require networked applications to test cyberspace events effectively. As testing becomes more advanced, it involves multiple real-world applications with flexible execution orders. However, it is increasingly challenging to orchestrate large-scale, chained, and heterogeneous Internet applications. State-of-the-art orchestration techniques face scalability issues due to inefficient representation models and entangled scheduling of events and applications. To address these issues, we present Wukong, a disentangled orchestration system in cyber ranges that disaggregates the scheduling and execution of workflows and their applications in a decentralized coordination approach. First, we overcome the heterogeneity of events with a workflow model that encodes event chains with compositional Directed Acyclic Graphs (DAGs) and unified event triggers. Second, Wukong disaggregates the execution of DAGs and applications with push-pull decentralized coordination over distributed agents. Our evaluation of Wukong on a real-world cyber range demonstrates its expressive, scalable, and efficient abilities for automatically emulating diverse event chains. The storage footprint of compositional modeling is up to 57 times smaller than that of baseline models. Wukong's response delay is 1.52 to 2.74 times shorter than state-of-the-art orchestration engines, and the scheduling delay is up to 2.16 times smaller than the baseline approach.
引用
收藏
页码:2344 / 2360
页数:17
相关论文
共 50 条
  • [21] An Experimental Approach for Estimating Cyber Risk: a Proposal Building upon Cyber Ranges and Capture the Flags
    Di Tizio, Giorgio
    Massacci, Fabio
    Allodi, Luca
    Dashevskyi, Stanislav
    Mirkovic, Jelena
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 56 - 65
  • [22] Leveraging Cyber Ranges for Prototyping, Certification and Training: The ECHO case
    Mengidis, Notis
    Bozhilova, Maya
    Ceresola, Cyril
    Colabuono, Consuelo
    Cooke, Michael
    Depaix, Gregory
    Genchev, Angel
    Koykov, Georgi
    Mees, Wim
    Merialdo, Matteo
    Voulgaridis, Antonis
    Tsikrika, Theodora
    Votis, Konstantinos
    Vrochidis, Stefanos
    2022 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2022, : 299 - 304
  • [23] Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model
    Chaskos, Evangelos
    Diakoumakos, Jason
    Kolokotronis, Nicholas
    Lepouras, George
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [24] A step-by-step definition of a reference architecture for cyber ranges
    Kampourakis, Vyron
    Gkioulos, Vasileios
    Katsikas, Sokratis
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2025, 88
  • [25] Design and Evaluation of Advanced Persistent Threat Scenarios for Cyber Ranges
    Bierwirth, Tore
    Pfuetzner, Stefan
    Schopp, Matthias
    Steininger, Christoph
    IEEE ACCESS, 2024, 12 : 72458 - 72472
  • [26] Cyber Physical Production Systems Dynamic Orchestration of Mechatronic Field Device Functions
    Loskyll, Matthias
    Schlick, Jochen
    AT-AUTOMATISIERUNGSTECHNIK, 2013, 61 (10) : 690 - 699
  • [27] Cyber ranges and security testbeds: Scenarios, functions, tools and architecture
    Yamin, Muhammad Mudassar
    Katt, Basel
    Gkioulos, Vasileios
    COMPUTERS & SECURITY, 2020, 88
  • [28] On Service Orchestration of Cyber Physical System and Its Verification Based on Petri Net
    Bin Ahmadon, Mohd Anuaruddin
    Yamaguchi, Shingo
    2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
  • [29] SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)
    Liaqat, Shahzana
    Akhunzada, Adnan
    Shaikh, Fatema Sabeen
    Giannetsos, Athanasios
    Jan, Mian Ahmad
    COMPUTER COMMUNICATIONS, 2020, 160 : 697 - 705
  • [30] An Approach to Train and Evaluate the Cybersecurity Skills of Participants in Cyber Ranges based on Cyber-Risk Models
    Erdogan, Gencer
    Hugo, Asmund
    Romero, Antonio Alvarez
    Varano, Dario
    Zazzeri, Niccolo
    Zitnik, Anze
    ICSOFT: PROCEEDINGS OF THE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGIES, 2020, : 509 - 520