Security solution

Cyber Range

Virtual Environment

Countermeasure Training Platform is developed based on the most advanced and mature virtualization technologies and supports typical network topology scenarios through virtualization. The supported scenarios include hosts, servers, security devices, terminal devices, gateway devices and various typical security services and applications. It supports these experiment scenarios through virtualization technology and simulates most actual working environments from the perspective of network security experiments, and provides closed, highly configurable and rollback-supported simulation environment for security defenders. Cyber Range Support Virtual Machine as Windows, Linux; Support Container technology as Docker; Support Virtual network device simulation as router, switch; Support Security device simulation as IPS, IDS, FW and WAF; Support Terminal device simulation as Android phone. Cyber Range supports large-scale network simulation, and large-scale network topology supports visual editing.

Basic Functions (such as user interaction)

Browser/Server structure provides easy-to-use zero-installation user interface and supportive basic functions. All the attack and defense operations of operators are completed within a closed experiment environment to prevent mutual interference during the process of training and multi-person contest. It also ensures that sensitive tools and data will not be released via any technical way from the system.

Courseware Scene

The training courseware is designed with the basic design concept of maximizing the ability of trainee in practical operation and security defense. The training courseware covers various security technologies and strategies such as the operating system, system kernel, workstation/terminal components, host security system, LAN security tools and components, network operating systems and devices, network topologies, and network protocols. It can play a significant role in the overall improvement of security experiments and training.

3D Situation Awareness (SA) Display

WebGL technology is adopted to analyze and filter the collected data, and assemble various business data models based on different display strategies, including attack data, contest data, user data, application data, etc. The platform can display real-time three-dimensional situation. It supports different display scenarios to adapt to different applications, such as virtual space situation, GIS-based situation display and data center situation display. The platform supports display of real-time situation and situation replay.

Traffic Generation System

Cyber Range supports Security Event Traffic Generator and Network Background Traffic Generator.

Security Event Traffic Generator: Quickly and dynamically generate a container-based traffic generation device on the selected target adjacent network. It can generate various types of network traffic of different sizes by controlling the bandwidth and the number of containers. It is usually used to generate hacker behaviors and DDoS. Traffic data for features such as attacks.

Network Background Traffic Generator: The Network Background Traffic Generator is usually set as a curing component of the scene, deployed in a predetermined location of the simulated network scenario, used to simulate normal business-related traffic, and constructs a near-real network background traffic, such as web browsing, sending and receiving mail. , real-time communication, streaming media, industrial control data flow, etc.

Authoritative vulnerability library and tool library resources

Cyber Range adopts the international advanced SCAP series protocol as the theoretical basis for the standardization of vulnerability. Through large-scale data acquisition system and big data analysis technology, it has formed the most vulnerable database of information in China.

Cyber Range has cyber security tools covering all aspects of cyber security, such as reverse, sniffing, scanning, infiltration, etc. It provide a clean and safe operation experience for the training team, and effectively focus on the training

News

Contact Us

Contact: alyadvisory

Tel: +601154458508

Phone: +601154458508

E-mail: CindyLai@alyadvisory.com

Add: 1-23-06, Menara Bangkok Bank, Laman Sentral Berjaya, 105 Jalan Ampang, 50400 Kuala Lumpur.