skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on December 5, 2025

Title: Developing a Modular Cloud-Based Kubernetes Powered Framework for Scalable Cybersecurity Education
We explore building a Kubernetes-powered, cloud-based cybersecurity education platform and framework named “EDURange Cloud”. It allows instructors to efficiently design and host their own cybersecurity competitions and exercises. The benefits of this system include enhanced security through isolated instances, cost-effective scaling that adjusts resources based on demand, and the agility to deploy or update challenges rapidly. Originally focused primarily on hosting Capture The Flag (CTF) competitions, the scope of EDURange Cloud will include support for cybersecurity demos and other educational exercises. This evolution will allow for a broader range of educational opportunities within the platform. EDURange Cloud was created as a distributed cloud alternative to the existing EDURange software \cite{Weiss2017Cybersecurity}, leveraging the power of Kubernetes to create an efficient and highly modular cybersecurity education framework. In addition to providing better load balancing and achievement tracking, EDURange Cloud extends the existing project by enabling full GUI desktop environments that are also much more easily customizable compared to command-line restricted exercises. The continued development of this platform could provide a new format for a wide range of hands-on exercises, going beyond just cybersecurity.  more » « less
Award ID(s):
2216492 2216485
PAR ID:
10595458
Author(s) / Creator(s):
; ; ; ;
Publisher / Repository:
ACM
Date Published:
ISBN:
9798400706042
Page Range / eLocation ID:
325 to 326
Subject(s) / Keyword(s):
Cybersecurity education Kubernetes
Format(s):
Medium: X
Location:
Virtual Event NC USA
Sponsoring Org:
National Science Foundation
More Like this
  1. Cybersecurity is a topic of growing interest. Do you have hands-on exercises that match the skills and levels of your students? Over the last few years, we have worked on making it easier to create, modify, and deploy exercises with assessment questions. EDURange is an open source project with exercises that span a wide range and can serve as templates for new ones. In addition to providing a framework for editing exercises, EDURange also allows Instructors to see student interaction and offer hints while they are doing the exercise. The features, that support this include chat with the instructor and machine learning algorithms for identifying which students need help. We plan to share some of the existing exercises and show how to adapt them to different students' profiles. We will also share our experiences with the hint system. Participants will gain experience in designing and adapting cybersecurity exercises and writing learning objectives and assessments. All backgrounds are welcome, whether you are new to teaching cybersecurity and have little experience with the command line, or whether you can create a network of containers and bash scripts to configure them. You will come away with a better understanding of how to design and create your own hands-on exercises. 
    more » « less
  2. The critical shortage of cyber security professionals has driven faculty interest in adding this to the curriculum, and it was added to the ACM/ IEEE Model Curriculum of 2013. This is a subject that demands hands-on exercises. There has been a modest increase in the number of such exercises, but the limit is usability. Most faculty do not have the time to create their own exercises, modify and install VMs, and set up assessment mechanisms. EDURange is a framework for accessing, developing and assessing interactive cybersecurity exercises. It has a range of exercises from introductory to advanced. We will demo an introductory exercise about using the command line and an advanced exercise about network scanning. We want to reach and engage as many faculty as possible, so that they can develop their own exercises. EDURange uses VMs in the cloud. Students only need an ssh-client. We have built tools to give faculty detailed information on how students are doing. This allows instructors to more easily see when students are stuck or heading in the wrong direction. The exercises we have created have manuals that instructors can use. Information about EDURange can be found at https://edurange.org. 
    more » « less
  3. In order to address the cybersecurity education and workforce challenges, we need a greater number of prepared faculty. In this workshop, we will introduce the EDURange framework, present one or two hands-on exercises that faculty can try, and discuss how they can be taught in classes. 
    more » « less
  4. In order to address the cybersecurity education and workforce challenges, we need a greater number of prepared faculty. In this workshop, we will introduce the EDURange framework, present one or two hands-on exercises that faculty can try, and discuss how they can be taught in classes. 
    more » « less
  5. Joseph Paris, Jackie Milhans (Ed.)
    The Cyber Human Ecosystem for Engaged Security Education (CHEESEHub) is an open web platform that hosts communitycontributed containerized demonstrations of cybersecurity concepts. In order to maximize flexibility, scalability, and utilization, CHEESEHub is currently hosted in a Kubernetes cluster on the Jetstream academic cloud. In this short paper, we describe the security model of CHEESEHub and specifically the various Kubernetes security features that have been leveraged to secure CHEESEHub. This ensures that the various cybersecurity exploits hosted in the containers cannot be misused, and that potential malicious users of the platform are cordoned off from impacting not just other legitimate users, but also the underlying hosting cloud. More generally, we hope that this article will provide useful information to the research computing community on a less discussed aspect of cloud deployment: the various security features of Kubernetes and their application in practice. 
    more » « less