Demand analysis and framework function design of cyber range construction in Colleges and Universities

This paper designs the network topology design, node simulation and environment construction, and drives the cyber range in three dimensions according to the teaching and scientific research needs of colleges and Universities: the module based on the classroom, the safety challenge of self-defining schedule, and the dynamic practice based on the team, so as to meet the needs of teaching and scientific research in the construction of cyber range in Colleges and universities.


Introduction
Under the increasingly severe situation of cyberspace confrontation, the key is based on network simulation and effect evaluation. The significance of the cyber range constructed by technology becomes more and more important [1]. No matter from the aspects of ensuring national security, maintaining social stability, industrial development and reducing economic losses, the cyber range has broad application prospects and high social and economic benefits [2].

Demand analysis
The main functions of network cyber range [3] include: 1) Evaluation and verification of network attack and defense weapons; 2) Scientific experiments and verification of new technologies; 3) Support personnel training and exercise.
Specific to the campus environment, the summary requirements are shown in Table 1: Can share valid data between the learning management system and the network shooting range; Allow students to independently train in the learning management system, and also can cross to range-based training Test Tools Able to score individual and team activities of students

Characteristic analysis
In the aspect of simulating and testing the network environment, the cyber range should provide various types of network equipment and host equipment [4] at the three levels of physical objects, virtual machines and containers to meet the needs of users for different fidelity of equipment simulation, and also provide support for traffic and user behavior simulation.
The cyber range provides a scene-based evaluation model, supports correctness evaluation and quantitative evaluation, and provides customizable analysis rule definitions, allowing users to write analysis rules as needed and use collected data for analysis and evaluation [5]. The cyber range shows the experimental situation based on the analysis results of network topology and collected data.

Introduction
The cyber range in the college environments takes requirement determination, task setting, resource allocation, operation deployment, experiment operation, data collection and result evaluation as the business process of the network security experiment to support the whole life cycle of the network security experiment.

Technical Architecture
This architecture provides an operation-oriented method to test the skills and abilities of individuals and network protection teams through roles and tasks. In this framework, each user can be assigned a learning plan, which provides a unique scoring method for measuring individual proficiency programs and overall progress [6].The technical framework of the cyber range is shown in Figure 1:

The experimental module based on basic theoretical knowledge
The experimental module based on basic theoretical knowledge covers four levels, as shown in Table 2:

The five subject categories involved in the customized security challenges
The five subject categories involved in the customized security challenges are shown in Table 3:

The content description Based on the dynamic training content of the team
The content description is shown in Table 4:

Summary
As a training base for security talents, colleges and universities should construct the campus cyber range scientifically and reasonably, which not only meets the basic functions of the cyber range, but also promotes the application effectiveness of the cyber range. This paper puts forward three training latitudes of campus cyber range, that is the basic latitudes based on safety knowledge and practical training, the challenge latitudes based on safety application and the role confrontation latitudes based on team dynamic training. With these three dimensions to jointly drive the training of network shooting range, we will achieve the goal of developing Cyberspace security talents more comprehensively.