Installation of a Resettable Cyber Range Environment using Proxmox and the GHOST Framework

Cybersecurity research and training increasingly depend on realistic and reproducible test environments. Virtualized cyber ranges provide a safe and flexible way to simulate infrastructure, replay background activity, inject attacks, and evaluate detection systems.

This internship focuses on deploying a modular, resettable cyber range using Proxmox VE, enhanced with the GHOST Framework for background traffic generation and a monitoring stack (Suricata, Zeek, and ELK or Graylog). The range will replicate departmental segmentation via virtual networks and support future cyber exercises and dataset creation.


🎯 Objectives

The intern will:

  • Install and configure Proxmox VE with VLAN-aware virtual networking.
  • Build reusable VM templates for key infrastructure roles (AD, Mail, Workstations, Attacker, Monitoring).
  • Deploy the GHOST Framework to generate scheduled background traffic.
  • Set up a monitoring infrastructure using Suricata, Zeek, and ELK or Graylog.
  • Create a structured GitLab repository documenting setup and configuration.

📦 Outcomes and Deliverables

By the end of the internship, the following will be completed:

  • A fully working, resettable Proxmox cyber range
  • Segmented virtual network, replicating enterprise departments
  • GHOST-driven background traffic simulation
  • Configured monitoring tools and central dashboard
  • A comprehensive GitLab repository containing:
    • Step-by-step deployment instructions
    • Initial automation scripts (optional)
    • Network and system diagrams
  • A network architecture diagram to visualize the setup
  • A blog post draft for CYLAB presenting the environment and its future uses

👤 Candidate Profile

  • Background in cybersecurity, IT infrastructure, or network engineering
  • Proficient with Linux administration and virtualization concepts
  • Familiarity with network protocols, IDS tools, and basic scripting
  • Motivation to contribute to reusable, research-grade cyber environments

Interested?

Contact us

This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept