{"id":6447,"date":"2026-02-10T17:55:23","date_gmt":"2026-02-10T09:55:23","guid":{"rendered":"https:\/\/www.alyadvisory.com\/?p=6447"},"modified":"2026-02-11T10:06:38","modified_gmt":"2026-02-11T02:06:38","slug":"6447","status":"publish","type":"post","link":"http:\/\/www.alyadvisory.com\/?p=6447","title":{"rendered":"Cyber Range"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6448 aligncenter\" src=\"http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11.png\" alt=\"\" width=\"500\" height=\"500\" srcset=\"http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11.png 2048w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11-300x300.png 300w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11-1024x1024.png 1024w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11-150x150.png 150w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11-768x768.png 768w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11-1536x1536.png 1536w, http:\/\/www.alyadvisory.com\/wp-content\/uploads\/2026\/02\/\u672a\u6807\u9898-11-12x12.png 12w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p><strong>Virtual Environment<\/strong><\/p>\n<p>Countermeasure Training Platform is developed based on the most advanced and mature virtualization technologies and supports typical network topology scenarios through virtualization. The supported scenarios include hosts, servers, security devices, terminal devices, gateway devices and various typical security services and applications. It supports these experiment scenarios through virtualization technology and simulates most actual working environments from the perspective of network security experiments, and provides closed, highly configurable and rollback-supported\u00a0simulation environment for security defenders. Cyber Range Support Virtual Machine as Windows, Linux;\u00a0Support Container technology as Docker;\u00a0Support Virtual network device simulation as router, switch;\u00a0Support Security device simulation as IPS, IDS, FW and WAF; Support Terminal device simulation as Android phone.\u00a0Cyber Range supports large-scale network simulation, and large-scale network topology supports visual editing.<\/p>\n<p><strong>Basic Functions (such as user interaction)<\/strong><\/p>\n<p>Browser\/Server structure\u00a0provides easy-to-use zero-installation user interface and supportive\u00a0basic functions.\u00a0All the attack\u00a0and defense\u00a0operations of operators are completed within a closed experiment environment to prevent mutual interference during\u00a0the process of training and multi-person contest. It also ensures that sensitive tools and data will\u00a0not be released via\u00a0any\u00a0technical way from the system.<\/p>\n<p><strong>Courseware Scene<\/strong><\/p>\n<p>The training courseware is designed with the basic design concept of\u00a0maximizing the ability of\u00a0trainee in practical operation\u00a0and security defense. The\u00a0training courseware covers various security technologies and strategies such as the operating system, system kernel, workstation\/terminal components, host security system, LAN security tools and components, network operating systems and devices, network topologies, and network protocols. It can play a significant role in the overall improvement\u00a0of security experiments and training.<\/p>\n<p><strong>3D Situation Awareness (SA) Display<\/strong><\/p>\n<p>WebGL technology is adopted to analyze and filter the collected data,\u00a0and assemble various business data models based on different display strategies, including attack data, contest data, user data, application data, etc.\u00a0The platform\u00a0can display\u00a0real-time three-dimensional situation. It supports\u00a0different display scenarios\u00a0to adapt to\u00a0different applications,\u00a0such as virtual space situation, GIS-based situation display and data center situation display. The platform\u00a0supports\u00a0display of\u00a0real-time situation and\u00a0situation replay.<\/p>\n<p><strong>Traffic Generation System<\/strong><\/p>\n<p>Cyber Range supports Security Event Traffic Generator and Network Background Traffic Generator.<\/p>\n<p>Security Event Traffic Generator: Quickly and dynamically generate a container-based traffic generation device on the selected target adjacent network. It can generate various types of network traffic of different sizes by controlling the bandwidth and the number of containers. It is usually used to generate hacker behaviors and DDoS. Traffic data for features such as attacks.<\/p>\n<p>Network Background Traffic Generator: The Network Background Traffic Generator is usually set as a curing component of the scene, deployed in a predetermined location of the simulated network scenario, used to simulate normal business-related traffic, and constructs a near-real network background traffic, such as web browsing, sending and receiving mail. , real-time communication, streaming media, industrial control data flow, etc.<\/p>\n<p><strong>Authoritative vulnerability library and tool library resources<\/strong><\/p>\n<p>Cyber Range adopts the international advanced SCAP series protocol as the theoretical basis for the standardization of vulnerability. Through large-scale data acquisition system and big data analysis technology, it has formed the most vulnerable database of information in China.<\/p>\n<p>Cyber Range has cyber security tools covering all aspects of cyber security, such as reverse, sniffing, scanning, infiltration, etc. It provide a clean and safe operation experience for the training team, and effectively focus on the training<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Virtual Environment Countermeasure Training Platform is developed based on the most advanced and mature virtualization technologies and supports typical network topology scenarios through virtualization. The supported scenarios include hosts, servers, security devices, terminal devices, gateway devices and various typical security services and applications. It supports these experiment scenarios through virtualization technology and simulates most actual [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":6448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-6447","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-solution"],"_links":{"self":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts\/6447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6447"}],"version-history":[{"count":3,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts\/6447\/revisions"}],"predecessor-version":[{"id":6452,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/posts\/6447\/revisions\/6452"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=\/wp\/v2\/media\/6448"}],"wp:attachment":[{"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6447"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6447"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.alyadvisory.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}