[1] SHEPHERD L A,PAPLI S D,CONACHER J.Human-computer interaction considerations when developing cyber ranges[J].arXiv:2007.04760,2020.
[2] ORBINATO V.A next-generation platform for cyber range-as-a-service[J].arXiv:2112.11233,2021.
[3] 方滨兴,贾淊,李爱平,等.网络空间靶场技术研究[J].信息安全学报,2016,3(1):1-9.
FANG B X,JIA Y,LI A P,et al.Cyber ranges:state-of-the-art and research challenges[J].Journal of Cyber Security,2016,3(1):1-9.
[4] NIST(National Institute of Standards and Technology).Cyber range[EB/OL].(2018-02-13)[2021-10-30].https://www.nist.gov/system/files/documents/2018/02/13/cyber_
ranges.pdf.
[5] YAMIN M M,KATT B,GKIOULOS V.Cyber ranges and security testbeds:scenarios,functions,tools and architecture[J].Computers & Security,2020,88(1):1-26.
[6] Department of Defense.Cybersecurity test and evaluation guidebook 2.0[EB/OL].(2018-11-19)[20211-10-29].http://finelybook.com/go/?url=https://545c.com/file/15081096-320806906.
[7] MOSTAFIZUR R M.Cybersecurity test and evaluation workshop[EB/OL].(2018-07-01)[2021-10-30].https://www.researchgate.net/publication/326106406.
[8] SEFFERS G I.Joint range tailors cyber training to war-fighter needs[J].Signal,2013,67(6):33-35.
[9] PRIDMORE L,LARDIERI P,HOLLISTER R.National cyber range(NCR) automated test tools:implications and application to network-centric support tools[C]//2010 IEEE AUTOTESTCON,Orlando,FL,USA,Sept 13-16,2010.Piscataway:IEEE,2000:1-4.
[10] FERGUSON B,TALL A,OLSEN D.National cyber range overview[C]//2014 IEEE Military Communications Conference,Baltimore,MD,USA,Oct 6-8,2014.Piscataway:IEEE,2014:123-128.
[11] MOORMAN R W.A platform for cyber mission training[J].Military Simulation & Training Magazine,2019,36(1):10-13.
[12] PULLEN J M,RUTH J.Military training in a cyber-active environment exploiting C2-simulation interoperation[EB/OL].[2021-09-18].https://netlab.gmu.edu/pubs/SIW2018-paper29-Pullen-Ruth-v3_submitted.pdf.
[13] National Initiative for Cybersecurity Education(NICE).The cyber range:a guide[EB/OL].(2020-10-25)[2021-10-26].https://www.nist.gov/system/files/documents/2020/06/25/The%20Cyber%20Range%20-%20A%20Guide%20%28NIST-NICE%29%20%28Draft%29%20-%20062420_1315.pdf.
[14] IBM.X-force command center introduction[EB/OL].[2021-10?30].https://www.coursera.org/lecture/introduction-cybersecurity-cyber-attacks/x-force-command-center-introduction-wVyMu.
[15] BALFAQIH Z.Design and development of network simulator module for distributed mobility management protocol[J].Journal of Ambient Intelligence and Humanized Computing,2020(4):1-15.
[16] Cisco Networking Academy.Cisco packet tracer[EB/OL].[2021-10-30].https://www.netacad.com/courses/packet-tracer.
[17] Openstack.Vision for OpenStack clouds[EB/OL].(2019-03-31)[2021-04-28].https://governance.openstack.org/tc/reference/technical?vision.html?_ga=2.76517271.348431191.
1620018374-1778004197.1620018374.
[18] Docker.Docker overview[EB/OL].[2021-04-28].https://docs.docker.com/get-started/overview/.
[19] MUKMIN C,CHOLIL W.Perbandingan OpenVZ dengan kernel based virtual machine(KVM)[J].Jurnal Ilmiah Matrik,2019,20(2):129-135.
[20] KHANGURA S K,AKN S.Online available bandwidth estimation using multiclass supervised learning techniques[J].Computer Communications,2021,170(4):177-189.
[21] Emulab.The Emulab manual[EB/OL].(2020-07-03)[2021-05-28].http://docs.emulab.net/.
[22] VASUDEVAN D,SAMRUDHI N.Software-defined networks[J].IEEE Potentials,2018,37(5):21-24.
[23] YAN Q,SHENG H,RONG H.Research on modeling and forecasting of network traffic data with alpha distribution noise based on FARIMA model[J].IOP Conference Series:Materials Science and Engineering,2020,750(1):1-7.
[24] 杜爽,徐展琦,马涛,等.基于神经网络模型的网络流量预测综述[J].无线电通信技术,2020,46(2):216-222.
DU S,XU Z Q,MA T,et al.A survey of network traffic prediction based on neural network models[J].Radio Communications Technology,2020,46(2):216-222.
[25] 凌立文,张大斌.组合预测模型构建方法及其应用研究综述[J].统计与决策,2019,35(1):20-25.
LING L W,ZHANG D B.A review of combinatorial forecasting model construction and its application[J].Statistics & Decision,2019,35(1):20-35.
[26] HUANG Z,DONG K,LIU H,et al.Multi-nodes traffic replay method based on IP-mapping[C]//Proceedings of the 3rd International Conference on Computer Engineering,Information Science & Application Technology (ICCIA 2019),Wuhan,China,May 31,2019:566-570.
[27] LIU H,AN L,REN J,et al.An interactive traffic replay method in a scaled-down environment[J].IEEE Access,2019(7):10734-10744.
[28] LIU H,ZHANG X,LI J,et al.A novel collective user web behavior simulation method[J].Computers,Materials and Continua,2021,66(3):2539-2553.
[29] JI Y,ZHANG G,XIE S,et al.Container networking performance analysis for large-scale user behavior simu-lation[J].Journal of Computer and Communications,2019,7(10):136-146.
[30] ZHANG Z,LU G,ZHANG C,et al.CyFRS:a fast recoverable system for cyber range based on real network environment[C]//2020 Information Communication Technologies Conference(ICTC),Nanjing,China,May 29-31,2020.Piscataway:IEEE,2020.
[31] GIULIANO V,FORMICOLA V.ICSrange:a simulation-based cyber range platform for industrial control systems[J].arXiv:1909.01910,2019.
[32] MAURO A,VINCENZO G C,MICHELE C,et al.A framework for the evaluation of trainee performance in cyber range exercises[J].Mobile Networks and Applications,2020,25(1):236-247.
[33] URIAS V E,STOUT W M S,VAN L B,et al.Cyber range infrastructure limitations and needs of tomorrow:a position paper[C]//2018 International Carnahan Conference on Security Technology(ICCST),Quebec,Canada,Oct 22-25,2018.Piscataway:IEEE,2018:1-5.
[34] ManTech.ManTech launches space range to help safeguard U.S. space critical infrastructure from cyberattacks[EB/OL].(2021-05-04)[2021-10-30].https://investor.mantech.com/node/17131/pdf.
[35] ManTech.ACRE-the ManTech advanced cyber range environment[EB/OL].(2017-01-01)[2021-10-29].https://www.mantech.com/capabilitiescyber/acrer-advanced-cyber-range-environment.
[36] RUSSO E,COSTA G,ARMANDO A.Scenario design and validation for next generation cyber ranges[C]//2018 IEEE 17th International Symposium on Network Computing and Applications(NCA),Cambridge,MA,USA,Oct 31-Nov 2,2018.Piscataway:IEEE,2018:1-4.
[37] KAVALLIERATOS G,KATSIKAS S K,GKIOULOS V.Towards a cyber-physical range[C]//Asia CCS’19:Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,Auckland,New Zealand,July 9-12,2019.New York:ACM,2019:25-34.