Abstract
Mimetic environments, which mimic actual networks including personal computers, network assets, etc., are required for cyber range or malware analysis. However, constructing various mimetic environments is costly and tedious because each environment has different network assets. Thus, we propose a building block system for constructing mimetic network environments for cyber security experiments. These building blocks provides a fine-grained way to manage disk images and files to reduce the construction cost. In this paper, we describe the design and implementation of the building block system called Alfons.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
SecCap: Education network for practical information technologies-security-(only available in japanese) (2015). https://www.seccap.jp
Hardening 10 APAC: A security competition like no other (2014). http://wasforum.jp/hardening-project/hardening-10-apac-en/
Miyachi, T., Nakagawa, T., Chinen, K.i., Miwa, S., Shinoda, Y.: StarBED and SpringOS architectures and their performance. In: TRIDENTCOM, vol. 90, pp. 43–58 (2011)
Yasuda, S., Miura, R., Ota, S., Takano, Y., Miyachi, T.: Building block type construction system for mimetic environment (only available in japanese). In: Proceedings of Internet Conference 2015 JSSST, vol. 77, pp. 69–78, October 2015
Cuckoo Sandbox (2015). http://www.cuckoosandbox.org/
Kruegel, C., Emulation, F.S.: Achieving successful automated dynamic analysis of evasive malware. In: Black Hat (2014)
Miwa, S., Miyachi, T., Eto, M., Yoshizumi, M., Shinoda, Y.: Design and implementation of an isolated sandbox with mimetic internet used to analyze malwares. In: Benzel, T.V., Kesidis, G. (eds.) DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, Ma, USA, 6–7 August 2007. USENIX Association (2007)
OpenStack (2015). https://www.openstack.org/
VMWare vSphere (2015). http://www.vmware.com/products/vi/
Vagrant (2015). https://www.vagrantup.com
Ansible (2015). http://www.ansible.com/home
chef (2015). https://www.chef.io
ENCS: European network for cyber security (2015). https://www.encs.eu
ICS-CERT: The industrial control systems cyber emergency response team (2015). https://ics-cert.us-cert.gov
CRIAB. http://www.boeing.com/defense/cybersecurity-information-management/
Lindorfer, M., Kolbitsch, C., Milani Comparetti, P.: Detecting Environment-Sensitive Malware. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 338–357. Springer, Heidelberg (2011). doi:10.1007/978-3-642-23644-0_18
Detecting Malware and Sandbox Evasion Techniques (2015). https://www.sans.org/reading-room/whitepapers/forensics/detecting-malware-sandbox-evasion-techniques-36667
Acknowledgment
The authors thank S. Miwa, Ph.D. from the National Institute of Information and Communications Technology and T. Inoue, Ph.D. from the Japan Advanced Institute of Science and Technology for their insightful comments and suggestions. The authors thank H. Nakai and K. Akashi for their generous support. The authors thank the Hardening Project for giving us the opportunity to practice with the system.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Yasuda, S., Miura, R., Ohta, S., Takano, Y., Miyachi, T. (2017). Alfons: A Mimetic Network Environment Construction System. In: Guo, S., Wei, G., Xiang, Y., Lin, X., Lorenz, P. (eds) Testbeds and Research Infrastructures for the Development of Networks and Communities. TridentCom 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 177. Springer, Cham. https://doi.org/10.1007/978-3-319-49580-4_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-49580-4_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49579-8
Online ISBN: 978-3-319-49580-4
eBook Packages: Computer ScienceComputer Science (R0)