Cyber Warfare Simulator Offensive and Defensive Threat Modeling and Evaluation

Welcome to DSpace BU Repository

Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.

Show simple item record

dc.contributor.author Ammarah Khaleeq, 01-235172-012
dc.date.accessioned 2022-01-17T10:56:28Z
dc.date.available 2022-01-17T10:56:28Z
dc.date.issued 2021
dc.identifier.uri http://hdl.handle.net/123456789/11657
dc.description Supervised by Prof. Dr. Faisal Bashir en_US
dc.description.abstract Cyber threats are on the rise and with each passing year significant increase is observed internationally. Despite numerous anti-malware measures, cybercriminals and hackers aren’t ones to give up easily, especially not as long as there’s money to be made in malware. Although, some traditionally-popular forms of malware appear to be losing ground in recent years, as hackers and cybercriminals are changing their tactics to attack new or underutilized vulnerabilities [1]. Information Systems Audit and Control Association (ISACA), in its latest 2020 annual report, highlighted that 62% of cybersecurity professionals believe their organization’s cybersecurity team is understaffed. Understaffing among organizations, including business and government, could create a strain on existing staff and lead to an increased risk from malware threats. The demand for cyber security professionals is increasing year-over-year. Industry has always raised concern over the readiness and skill set of new employees especially in the offensive & defensive domains of cyber security. It is of utmost importance that offensive security skillset should be developed in students and cyber security professionals that should be comparable to expertise of cyber criminals. A cyber range is a safe environment for training and learning about the execution of cyberattacks. If an organization wants to train and keeping the main systems unaffected cyber range is the best approach. Cyber ranges are the exact mirror of the real systems. It is a simulation and has complete resources to learn without impacting the real system. Previously the cyber ranges where in the fixed places and locality. Now a day’s cyber ranges are shifting to the cloud for flexibility. Cyber warfare simulators are advanced cyber ranges were multiple user can launch and defend against cyberattacks in a virtual environment. Besides Cyber range used as a trainer platform, it is also used as a training purpose in securing the system. Network and infrastructure security are widely ignored due to less awareness. For such reasons, the proposed project is to give knowledge and training to people by learning about networking infrastructure and its vulnerabilities by applying different practices like security hacking, malware analysis, phishing, etc. In this Final Year Project (FYP), a cyber warfare simulator is developed with focus on a user friendly digital-end for generating simulations. The cyber warfare platform is created using advanced and latest technologies for better performance. The front end is designed in React JS and in the backend Docker, Django and Node JS is used allowing the user to have an interactive interface to learn and train themselves, with a user friendly environment. The threat base or vulnerable software/machines are built using containers use Docker technology. It allows resource friendly virtualization upon same operating system kernel, as compared to dedicated virtual machines used in many other similar products. The drawback containers have is that it only supports Unix based programs and software packages but its efficient resource usage is enough to prove its worth. The developed cyber warfare simulator provides an excellent opportunity for expansion by increasing new Docker images of advance vulnerabilities. The developed product can be used to train both students and professionals in the domain of penetration testing. en_US
dc.language.iso en en_US
dc.publisher Computer Science & IT BUIC en_US
dc.relation.ispartofseries BS (IT);MFN-P 9764
dc.subject Computer Science en_US
dc.subject Cyber warfare simulator en_US
dc.subject Evaluation en_US
dc.title Cyber Warfare Simulator Offensive and Defensive Threat Modeling and Evaluation en_US
dc.type Project Reports en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account