Cyber security exercises and competitions as a platform for cyber security experiments

作者: Teodor Sommestad , Jonas Hallberg

DOI: 10.1007/978-3-642-34210-3_4

关键词:

摘要: This paper discusses the use of cyber security exercises and competitions to produce data valuable for research. Cyber are primarily arranged train participants and/or offer competence contests those with a profound interest in security. how can be used as basis experimentation field. The conjecture is that (1) they make it possible control number variables relevance (2) results study several topics field meaningful way. Among other things, validate metrics assess impact different protective measures on system.

参考文章(51)
Adrian Constantin Furtuna, Victor-Valeriu Patriciu, Guide for designing cyber security exercises E-ACTIVITIES'09/ISP'09 Proceedings of the 8th WSEAS International Conference on E-Activities and information security and privacy. pp. 172- 177 ,(2009)
Matthew Meyers, Marc Rogers, Computer Forensics: The Need for Standardization and Certification. International Journal of Digital Evidence. ,vol. 3, ,(2004)
David John Leversage, Eric James Byres, Comparing Electronic Battlefields: Using Mean Time-To-Compromise as a Comparative Security Metric International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. pp. 213- 227 ,(2007) , 10.1007/978-3-540-73986-9_18
W.J. Schepens, J.R. James, Architecture of a cyber defense competition systems, man and cybernetics. ,vol. 5, pp. 4300- 4305 ,(2003) , 10.1109/ICSMC.2003.1245660
Joseph Migga Kizza, Computer Network Security ,(2005)
Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna, Organizing large scale hacking competitions international conference on detection of intrusions and malware and vulnerability assessment. pp. 132- 152 ,(2010) , 10.1007/978-3-642-14215-4_8
Teodor Sommestad, Amund Hunstad, Intrusion detection and the role of the system administrator Information Management & Computer Security. ,vol. 21, pp. 30- 40 ,(2013) , 10.1108/09685221311314400
Ronald C. Dodge, Curtis Carver, Aaron J. Ferguson, Phishing for user security awareness Computers & Security. ,vol. 26, pp. 73- 80 ,(2007) , 10.1016/J.COSE.2006.10.009
Rodrigo Werlinger, Kasia Muldner, Kirstie Hawkey, Konstantin Beznosov, Preparation, detection, and analysis: the diagnostic work of IT security incident response Information Management & Computer Security. ,vol. 18, pp. 26- 42 ,(2010) , 10.1108/09685221011035241