CyExec
∗
is a cyber range that can significantly re-
duce resource consumption and is suitable for cloud
services. Randomization of scenarios can further in-
crease its effectiveness. We have already started test-
ing it on several cloud services, and our goal is to
conduct online exercises and verify the effectiveness
of its educational outcome. We will continue our re-
search and development, and expand our information
security education in the future.
7 CONCLUSIONS
The cyber range used in information security exer-
cises is a system that allows students to learn knowl-
edge and skills efficiently, through a highly realis-
tic security incident experience reproduced in virtual
space. However, the system is not easy to implement
nor operate. In particular, scenario development re-
quires specialized knowledge, and using the same sce-
nario or sharing and leaking of scenario information
has been a problem.
We developed the DAG-based scenario random-
ization technique named CyExec
∗
on docker-based
cyber range system. Multiple scenarios with the same
learning objectives can enhance teaching effective-
ness and prevent cheating. CyExec
∗
makes the best
use of Docker’s performance, which allows us to build
exercise environment efficiently, eliminating the con-
cern of the increasing load on the system caused by
the scenario number increase. In comparison to Sec-
Gen, CyExec
∗
showed advantages of 1/3 memories,
1/4 CPU loads, and over 1/10 storage usage. This
shows that it has at least three times more capability
to reproduce scenarios than VM-based environments,
allowing more complex environments to be run simul-
taneously.
Our future work includes several main direc-
tions:(i) enriching the random scenarios that can be
provided by CyExec
∗
, (ii) applying to online exercise,
and (iii) testing their educational effectiveness.
ACKNOWLEDGEMENTS
This work is supported in part by the Telecommuni-
cation Advancement Foundation.
REFERENCES
Beuran, R., Inoue, T., Tan, Y., and Shinoda, Y. (2019). Re-
alistic cybersecurity training via scenarioprogression
management. In 2019 IEEE European Symposium on
Security and Privacy Workshops.
Chapman, P., Burket, J., and Brumley, D. (2014). Picoctf:
A game-based computer security competition for high
school students. In 2014 USENIX Summit on Gam-
ing, Games, and Gamification in Security Education
(3GSE 14), San Diego, CA. USENIX Association.
Chothia, T. and Novakovic, C. (2015). An offline capture
the flag-style virtual machine and an assessment of its
value for cybersecurity education. In 2015 USENIX
Summit on Gaming, Games, and Gamification in Se-
curity Education (3GSE 15).
Costa, G., Russo, E., and Armando, A. (2020). Automating
the generation of cyber range virtual scenarios with
vsdl.
Docker. Dockerfile reference.
https://docs.docker.com/engine/reference/builder/.
Docker. Overview of docker compose.
https://docs.docker.com/compose/.
Docker. What is a container? a standardized unit of
software. https://www.docker.com/resources/what-
container.
E, I. C., F, T. M., and Jean, K. (2017). Labtainers: a frame-
work for parameterized cybersecurity labs using con-
tainers.
Li, Z., Kihl, M., Lu, Q., and Andersson, J. A. (2017).
Performance overhead comparison between hypervi-
sor and container based virtualization. In 2017 IEEE
31st International Conference on Advanced Informa-
tion Networking and Applications (AINA), pages 955–
962.
Maki, N., Nakata, R., Toyoda, S., Kasai, Y., Shin, S., and
Seto, Y. (2020). An effective cybersecurity exercises
platform cyexec and its training contents. In 2020 In-
ternational Conference on Advances in Education and
Information Technology(AEIT’20).
Raj, A. S., Alangot, B., Prabhu, S., and Achuthan, K.
(2016). Scalable and lightweight ctf infrastructures
using application containers. In 2016 USENIX Work-
shop on Advances in Security Education (ASE 16).
Rapid7. Metasploitable2.
https://docs.rapid7.com/metasploit/metasploitable-2/.
Razvan, B., Cuong, P., Dat, T., Ken-ichi, C., Yasuo, T., and
Yoichi, S. (2017). Cytrone: An integrated cyberse-
curity training framework. In Proceedings of the 3rd
International Conference on Information Systems Se-
curity and Privacy (ICISSP 2017): 157-166.
Schreuders, Z. C., Butterfield, E., and Staniforth, P. (2015).
An open cloud-based virtual lab environment for com-
puter security education. In The first UK Workshop on
Cybersecurity raining & EducationVibrant Workshop
2015.
Schreuders, Z. C., Shaw, T., Shan-A-Khuda, M., Ravichan-
dran, G., and Keighley, J. (2017). Security sce-
nario generator (secgen): A framework for generat-
ing randomly vulnerable rich-scenario vms for learn-
ing computer security and hosting ctf events. In 2017
USENIX Workshop on Advances in Security Educa-
tion(ASE’17).
CyExec*: Automatic Generation of Randomized Cyber Range Scenarios
235