Leaf: An open-source cybersecurity training platform for realistic edge-IoT scenarios

Abstract The complexity of current cyber infrastructures requires specialized security-oriented skills to be acquired by a variety of different actors, in order to defend critical systems and sensitive data against emerging security threats and attacks. In order to facilitate this process, advanced cybersecurity education and training programs should be considered, as well as platforms and tools for simulating realistic training scenarios should be exploited. This paper presents an open-source solution for simulating cyber infrastructures, and reproducing realistic Internet of Things (IoT) scenarios, with specific focus on Edge applications. It can be used for the implementation of new cooperative and competitive cybersecurity training exercises and skills for different application domains, as well as validate solutions that can be used to prevent, detect, mitigate, recovery, and evaluate the attack impact.

[1]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[2]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[3]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[4]  Huimin Lu,et al.  Loss-Tolerant Event Communications Within Industrial Internet of Things by Leveraging on Game Theoretic Intelligence , 2018, IEEE Internet of Things Journal.

[5]  Francesco Palmieri,et al.  An HLA‐based framework for simulation of large‐scale critical systems , 2016, Concurr. Comput. Pract. Exp..

[6]  Christian Esposito,et al.  Pseudo-Dynamic Testing of Realistic Edge-Fog Cloud Ecosystems , 2017, IEEE Communications Magazine.

[7]  Elyes Ben Hamida,et al.  Adaptive security provisioning for vehicular safety applications , 2017 .

[8]  Francesco Palmieri,et al.  Automatic security assessment for next generation wireless mobile networks , 2011, Mob. Inf. Syst..

[9]  Yasuo Tan,et al.  CyTrONE: An Integrated Cybersecurity Training Framework , 2017, ICISSP.

[10]  Prem Prakash Jayaraman,et al.  IOTSim: A simulator for analysing IoT applications , 2017, J. Syst. Archit..

[11]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[12]  Rajiv Ranjan,et al.  Modelling and Simulation Challenges in Internet of Things , 2017, IEEE Cloud Computing.

[13]  Stefano Russo,et al.  Optimized task allocation on private cloud for hybrid simulation of large-scale critical systems , 2017, Future Gener. Comput. Syst..

[14]  Yacine Challal,et al.  A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.

[15]  Valentina Casola,et al.  Per-service security SLAs for cloud security management: model and implementation , 2018, Int. J. Grid Util. Comput..

[16]  Jamie Power,et al.  IPACSO: Towards Developing an Innovation Framework for ICT Innovators in the Privacy and CyberSecurity Markets , 2014, CSP Forum.

[17]  Ciprian Dobre,et al.  Event-based sensor data exchange and fusion in the Internet of Things environments , 2018, J. Parallel Distributed Comput..

[18]  Michal Choras,et al.  Simulation platform for cyber-security and vulnerability analysis of critical infrastructures , 2017, J. Comput. Sci..

[19]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..