SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Downloaden Sie, um offline zu lesen
CYBER RANGE
1
CYBER RANGE
2
CYBER RANGE
PLAN DE LAPRESENTATION
3
CYBER RANGE
o INTRODUCTION AU CYBER RANGE
o FONCTIONNEMENT D’UN CYBER RANGE
o PRESENTATION DE QUELQUE SOLUTIONS CYBER RANGE
o CONCLUSION
o SIMULATION DE LA SOLUTION SOUS VMware
I INTRODUCTION
4
CYBER RANGE
Centre de Cyber Range IMB : novembre 2016
I INTRODUCTION
5
CYBER RANGE
Cyber Range Offre :
• des conditions d’entrainement proches du réel
• Une parfaite reconstitution des topologies réseau
CYBER RANGE
6
Comment fonctionnent ces environnements ?
Quelles sont les technologies utilisées ?
CYBER RANGE
7
FONCTIONNEMENT D’UN CYBER RANGE
CYBER RANGE
8
o FONCTIONNEMENT D’UN CYBER RANGE
Les technologies de virtualisation
Générateur de trafic
Threat intelligence
CYBER RANGE
9
o FONCTIONNEMENT D’UN CYBER RANGE
Environnement de virtualisation
HyperviseurServeur
Distant
Système
délocaliser
CYBER RANGE
10
La Communication réseau entre les VMs
Mode bridge
o FONCTIONNEMENT D’UN CYBER RANGE
CYBER RANGE
11
Générateur de trafic (Flux)
o FONCTIONNEMENT D’UN CYBER RANGE
CYBER RANGE
12
o FONCTIONNEMENT D’UN CYBER RANGE
CYBER RANGE
13
o FONCTIONNEMENT D’UN CYBER RANGE
CYBER RANGE
14
III Les solutions de Cyber Range existant
CYBERBIT
CYBER RANGE
15
III Les solutions de Cyber Range existant
OCCP
CYBER RANGE
16
III Les solutions de Cyber Range existant
Open nebula
CYBER RANGE
17
III Les solutions de Cyber Range existant
Emulate vitual
Environement
CYBER RANGE
18
Partie 4: Simulation et test:
Bibliothèque de topologies et scénarios
19
Avantages Inconvénients
Indépendant d’une application cliente Chaque utilisateur ne peut exécuter d’un
laboratoire
Possibilité d’exécuter plusieurs laboratoire
simultané port TCP pour la session telnet :128
Le nombre de nœuds par laboratoire :63Capture locale avec Wireshark
Client local Telnet et VNC Absence de Threat Intelligence / générateur
De trafic.
Absence d’un système de Suivi des utilisateurs
Bibliothèque de topologies et scénarios
Possibilité d’avoir trois types d’utilisateurs
déploiement sur Cloud public en mode IaaS

Weitere ähnliche Inhalte

Was ist angesagt?

Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.
Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.
Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.https://www.facebook.com/garmentspace
 
Sự hấp phụ khí và hơi trên chất hấp phụ rắn
Sự hấp phụ khí và hơi trên chất hấp phụ rắnSự hấp phụ khí và hơi trên chất hấp phụ rắn
Sự hấp phụ khí và hơi trên chất hấp phụ rắnljmonking
 
3. Pho NMR-Final.pdf
3. Pho NMR-Final.pdf3. Pho NMR-Final.pdf
3. Pho NMR-Final.pdfHuNguynVn27
 
Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...
Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...
Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...Muhammad Mubashir Ali
 
Phương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdf
Phương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdfPhương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdf
Phương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdfMan_Ebook
 
Bài soạn đề cn dược
Bài soạn đề cn dượcBài soạn đề cn dược
Bài soạn đề cn dượcPhúc Bùi
 
Assertion reason question bank - disha experts
Assertion reason question bank - disha expertsAssertion reason question bank - disha experts
Assertion reason question bank - disha expertspoonam singh
 
[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...
[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...
[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...GiaSư NhaTrang
 

Was ist angesagt? (11)

Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.
Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.
Khảo sát thành phần hóa học quả mướp đắng momordica charantia l.
 
Classification of fungi
Classification of fungiClassification of fungi
Classification of fungi
 
Sự hấp phụ khí và hơi trên chất hấp phụ rắn
Sự hấp phụ khí và hơi trên chất hấp phụ rắnSự hấp phụ khí và hơi trên chất hấp phụ rắn
Sự hấp phụ khí và hơi trên chất hấp phụ rắn
 
3. Pho NMR-Final.pdf
3. Pho NMR-Final.pdf3. Pho NMR-Final.pdf
3. Pho NMR-Final.pdf
 
Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...
Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...
Oedogonium Introduction, Features, Unique Characters and Life Cycle, Phycolog...
 
Phương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdf
Phương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdfPhương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdf
Phương Pháp Phổ Tổng Trở Và Ứng Dụng​.pdf
 
Bài soạn đề cn dược
Bài soạn đề cn dượcBài soạn đề cn dược
Bài soạn đề cn dược
 
Assertion reason question bank - disha experts
Assertion reason question bank - disha expertsAssertion reason question bank - disha experts
Assertion reason question bank - disha experts
 
[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...
[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...
[Giasunhatrang.edu.vn]cong thuc-giai-nhanh-hop-chat-nhom-kem(hoa-hoc-va-ung-d...
 
Endosperm
EndospermEndosperm
Endosperm
 
Moldova
MoldovaMoldova
Moldova
 

Ähnlich wie Cyber Range

Virtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdf
Virtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdfVirtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdf
Virtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdfRihabBENLAMINE
 
Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...
Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...
Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...Microsoft Technet France
 
ARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUES
ARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUESARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUES
ARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUESSOAT
 
Cours reseau ouya
Cours reseau ouyaCours reseau ouya
Cours reseau ouyaYaya Diako
 
Webinar Nebula du 14/03/2017
Webinar Nebula du 14/03/2017Webinar Nebula du 14/03/2017
Webinar Nebula du 14/03/2017Zyxel France
 
Devenez l’Élu et maitrisez la Matrice AWS 🦸
Devenez l’Élu et maitrisez la Matrice AWS 🦸Devenez l’Élu et maitrisez la Matrice AWS 🦸
Devenez l’Élu et maitrisez la Matrice AWS 🦸Membré Guillaume
 
Introduction au Cloud Computing
Introduction au Cloud Computing Introduction au Cloud Computing
Introduction au Cloud Computing FICEL Hemza
 
Meetup sdn paris #4
Meetup sdn paris #4Meetup sdn paris #4
Meetup sdn paris #4SDN_Paris
 
WAN hybride
WAN hybrideWAN hybride
WAN hybrideIEEE 802
 
Réseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsnRéseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsnAchref Ben helel
 
alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)
alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)
alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)Alphorm
 
La sécurité des réseaux sans fil
La sécurité des réseaux sans filLa sécurité des réseaux sans fil
La sécurité des réseaux sans filsmiste
 
Sécurité des réseaux sans fil WIFI
Sécurité des réseaux sans fil WIFISécurité des réseaux sans fil WIFI
Sécurité des réseaux sans fil WIFISoukaina Boujadi
 
Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]
Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]
Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]IBM France PME-ETI
 
Softlayer webinar - Avril - Francais
Softlayer webinar - Avril - FrancaisSoftlayer webinar - Avril - Francais
Softlayer webinar - Avril - FrancaisNicolas Verdier
 

Ähnlich wie Cyber Range (20)

routage Ad hoc ZRP
routage Ad hoc ZRProutage Ad hoc ZRP
routage Ad hoc ZRP
 
Virtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdf
Virtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdfVirtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdf
Virtualisation & Cloud. Cloud Computing. Iset Siliana RSI3..pdf
 
Lora and LoraWan
Lora and LoraWanLora and LoraWan
Lora and LoraWan
 
Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...
Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...
Architecture Réseau des clouds privés avec Hyper-V et System Center Virtual M...
 
Talk gRPC et Dapr
Talk gRPC et DaprTalk gRPC et Dapr
Talk gRPC et Dapr
 
ARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUES
ARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUESARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUES
ARCHITECTURE MICROSERVICE : TOUR D’HORIZON DU CONCEPT ET BONNES PRATIQUES
 
Cours reseau ouya
Cours reseau ouyaCours reseau ouya
Cours reseau ouya
 
Webinar Nebula du 14/03/2017
Webinar Nebula du 14/03/2017Webinar Nebula du 14/03/2017
Webinar Nebula du 14/03/2017
 
Devenez l’Élu et maitrisez la Matrice AWS 🦸
Devenez l’Élu et maitrisez la Matrice AWS 🦸Devenez l’Élu et maitrisez la Matrice AWS 🦸
Devenez l’Élu et maitrisez la Matrice AWS 🦸
 
Introduction au Cloud Computing
Introduction au Cloud Computing Introduction au Cloud Computing
Introduction au Cloud Computing
 
VPN (3).pptx
VPN (3).pptxVPN (3).pptx
VPN (3).pptx
 
Meetup sdn paris #4
Meetup sdn paris #4Meetup sdn paris #4
Meetup sdn paris #4
 
WAN hybride
WAN hybrideWAN hybride
WAN hybride
 
Réseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsnRéseau de capteurs sans fils wsn
Réseau de capteurs sans fils wsn
 
alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)
alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)
alphorm.com - Formation Hyper-V & SCVMM 2008 R2 (70-659)
 
Rapport fiifo4 snmp
Rapport fiifo4 snmpRapport fiifo4 snmp
Rapport fiifo4 snmp
 
La sécurité des réseaux sans fil
La sécurité des réseaux sans filLa sécurité des réseaux sans fil
La sécurité des réseaux sans fil
 
Sécurité des réseaux sans fil WIFI
Sécurité des réseaux sans fil WIFISécurité des réseaux sans fil WIFI
Sécurité des réseaux sans fil WIFI
 
Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]
Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]
Monter et gérer son Cloud Hybride [#CloudAccelerate 13/06/2014 @ IBM CC Paris]
 
Softlayer webinar - Avril - Francais
Softlayer webinar - Avril - FrancaisSoftlayer webinar - Avril - Francais
Softlayer webinar - Avril - Francais
 

Mehr von Thibault Debatty

An introduction to similarity search and k-nn graphs
An introduction to similarity search and k-nn graphsAn introduction to similarity search and k-nn graphs
An introduction to similarity search and k-nn graphsThibault Debatty
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessThibault Debatty
 
Design and analysis of distributed k-nearest neighbors graph algorithms
Design and analysis of distributed k-nearest neighbors graph algorithmsDesign and analysis of distributed k-nearest neighbors graph algorithms
Design and analysis of distributed k-nearest neighbors graph algorithmsThibault Debatty
 
A comparative analysis of visualisation techniques to achieve CySA in the mi...
A comparative analysis of visualisation techniques to achieve CySA in the  mi...A comparative analysis of visualisation techniques to achieve CySA in the  mi...
A comparative analysis of visualisation techniques to achieve CySA in the mi...Thibault Debatty
 
Multi-Agent System for APT Detection
Multi-Agent System for APT DetectionMulti-Agent System for APT Detection
Multi-Agent System for APT DetectionThibault Debatty
 
Building k-nn Graphs From Large Text Data
Building k-nn Graphs From Large Text DataBuilding k-nn Graphs From Large Text Data
Building k-nn Graphs From Large Text DataThibault Debatty
 
Determining the k in k-means with MapReduce
Determining the k in k-means with MapReduceDetermining the k in k-means with MapReduce
Determining the k in k-means with MapReduceThibault Debatty
 
Parallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with HadoopParallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with HadoopThibault Debatty
 

Mehr von Thibault Debatty (15)

An introduction to similarity search and k-nn graphs
An introduction to similarity search and k-nn graphsAn introduction to similarity search and k-nn graphs
An introduction to similarity search and k-nn graphs
 
Blockchain for dummies
Blockchain for dummiesBlockchain for dummies
Blockchain for dummies
 
Building a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation AwarenessBuilding a Cyber Range for training Cyber Defense Situation Awareness
Building a Cyber Range for training Cyber Defense Situation Awareness
 
Design and analysis of distributed k-nearest neighbors graph algorithms
Design and analysis of distributed k-nearest neighbors graph algorithmsDesign and analysis of distributed k-nearest neighbors graph algorithms
Design and analysis of distributed k-nearest neighbors graph algorithms
 
A comparative analysis of visualisation techniques to achieve CySA in the mi...
A comparative analysis of visualisation techniques to achieve CySA in the  mi...A comparative analysis of visualisation techniques to achieve CySA in the  mi...
A comparative analysis of visualisation techniques to achieve CySA in the mi...
 
Easy Server Monitoring
Easy Server MonitoringEasy Server Monitoring
Easy Server Monitoring
 
Data diode
Data diodeData diode
Data diode
 
USB Portal
USB PortalUSB Portal
USB Portal
 
Smart Router
Smart RouterSmart Router
Smart Router
 
Web shell detector
Web shell detectorWeb shell detector
Web shell detector
 
Graph based APT detection
Graph based APT detectionGraph based APT detection
Graph based APT detection
 
Multi-Agent System for APT Detection
Multi-Agent System for APT DetectionMulti-Agent System for APT Detection
Multi-Agent System for APT Detection
 
Building k-nn Graphs From Large Text Data
Building k-nn Graphs From Large Text DataBuilding k-nn Graphs From Large Text Data
Building k-nn Graphs From Large Text Data
 
Determining the k in k-means with MapReduce
Determining the k in k-means with MapReduceDetermining the k in k-means with MapReduce
Determining the k in k-means with MapReduce
 
Parallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with HadoopParallel SPAM Clustering with Hadoop
Parallel SPAM Clustering with Hadoop
 

Cyber Range