ers. An attack on the container can affect the entire
system, including the host OS, which is a clear differ-
ence from the VM. Against such attacks, it was con-
firmed that container type virtualized environments
are unsuitable for cyber range exercises. Similarly,
vulnerabilities such as kernel vulnerabilities, host OS
configuration, and files required for container execu-
tion, and attacks against them, should be excluded
from container-based cyber range exercises.
7 CONCLUSIONS
With the shortage of information security personnel,
the cyber range is expected to be highly effective in
education. However, the cost of cyber range is high,
making it difficult for educational institutions to im-
plement them independently.
Therefore, to disseminate an inexpensive and de-
ployable cyber range using container-based virtu-
alization, we confirmed the superiority of contain-
ers and the performance of reproducing vulnerabili-
ties through comprehensive experiments. Comparing
the performance of containers and VMs in a typical
cyber-range environment, the containers consumed
less than 1/10th of the resources of the VMs. Con-
tainers can run more virtual instances than VMs on
the same host, building a lower cost cyber range.
We also compared the reproducibility of vulnera-
bilities between containers and VMs in an exhaustive
experiment using the vulnerability assessment tool
and the exploit module. We can confirmed a very high
similarity J of 0.993. Although content derived from
container characteristics must be excluded, contain-
ers have a very high vulnerability reproduction perfor-
mance, confirming that container-based virtualization
can be fully used in the cyber range.
These contents can be used as a benchmark for
developing scenarios and conducting exercises for
container-based cyber ranges. In the future, we will
experiment with more situations and conduct more
detailed research, including the ability to carry out
attack and defense scenarios. We will also promote
research and studies to increase the container-based
cyber range’s effectiveness, such as examining the ef-
fectiveness of education and refining exercise scenar-
ios based on behavioral analysis, to broaden the base
of security personnel training.
ACKNOWLEDGEMENTS
This work is supported in part by the Telecommuni-
cation Advancement Foundation.
REFERENCES
Ameen, R. Y. and Hamo, A. Y. (2013). Survey of server
virtualization.
Costa, G., Russo, E., and Armando, A. (2020). Automating
the generation of cyber range virtual scenarios with
vsdl.
GreenboneNetworks (2020). Openvas - open vulnerability
assessment scanner. https://www.openvas.org.
Irvine, Cynthia, E., Thompson, Michael, F., and Khosalim,
J. (2017). Labtainers: a framework for parameterized
cybersecurity labs using containers.
Kali.org (2020). Official kali linux docker im-
ages. https://www.kali.org/docs/containers/official-
kalilinux-docker-images/.
Li, Z., Kihl, M., Lu, Q., and Andersson, J. A. (2017).
Performance overhead comparison between hypervi-
sor and container based virtualization. In 2017 IEEE
31st International Conference on Advanced Informa-
tion Networking and Applications (AINA), pages 955–
962.
Maki, N., Nakata, R., Toyoda, S., Kasai, Y., Shin, S., and
Seto, Y. (2020). An effective cybersecurity exercises
platform cyexec and its training contents. In 2020 In-
ternational Conference on Advances in Education and
Information Technology(AEIT’20).
Makino, Y. and Klyuev, V. (2015). Evaluation of web vul-
nerability scanners. In 2015 IEEE 8th International
Conference on Intelligent Data Acquisition and Ad-
vanced Computing Systems: Technology and Applica-
tions (IDAACS), volume 1, pages 399–402.
MITRE (2020a). Common vulnerabilities and exposures.
https://cve.mitre.org/.
MITRE (2020b). Common weakness enumeration.
https://cwe.mitre.org/index.html.
Nmap.org (2020). Port scanning techniques.
https://nmap.org/book/man-port-scanning-
techniques.html.
Preeth E N, Mulerickal, F. J. P., Paul, B., and Sastri,
Y. (2015). Evaluation of docker containers based
on hardware utilization. In 2015 International Con-
ference on Control Communication Computing India
(ICCC), pages 697–700.
Rapid7 (2020). Metasploitable2.
https://docs.rapid7.com/metasploit/metasploitable-2/.
Razvan, B., Cuong, P., Dat, T., Ken-ichi, C., Yasuo, T., and
Yoichi, S. (2017). Cytrone: An integrated cyberse-
curity training framework. In Proceedings of the 3rd
International Conference on Information Systems Se-
curity and Privacy (ICISSP 2017): 157-166.
Stout, W. M., Urias, V., Van Leeuwen, B. P., and Lin, H. W.
(2018). An effective cybersecurity exercises platform
cyexec and its training contents. In Proposed for pre-
sentation at the IEEE International Carnahan Confer-
ence on Security Technology (ICCST).
VMWare, I. (2019). Vmware digital learn-
ing platform - cyber range solution.
https://www.vmware.com/content/dam/digitalmarket
ing/vmware/en/pdf/solutions/industry/vmware-cyber
range-datasheet.pdf.
ICISSP 2021 - 7th International Conference on Information Systems Security and Privacy
642