Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education
Systems
- URL: http://arxiv.org/abs/2101.05538v1
- Date: Thu, 14 Jan 2021 10:26:46 GMT
- Title: Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education
Systems
- Authors: Marcus Kn\"upfer, Tore Bierwirth, Lars Stiemert, Matthias Schopp,
Sebastian Seeber, Daniela P\"ohn, Peter Hillmann
- Abstract summary: The proposed taxonomy includes different factors of the technical setup, audience, training environment, and training setup.
The provided taxonomy is extendable and can be used in further application areas as research on new security technologies.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The lack of guided exercises and practical opportunities to learn about
cybersecurity in a practical way makes it difficult for security experts to
improve their proficiency. Capture the Flag events and Cyber Ranges are ideal
for cybersecurity training. Thereby, the participants usually compete in teams
against each other, or have to defend themselves in a specific scenario. As
organizers of yearly events, we present a taxonomy for interactive cyber
training and education. The proposed taxonomy includes different factors of the
technical setup, audience, training environment, and training setup. By the
comprehensive taxonomy, different aspects of interactive training are
considered. This can help trainings to improve and to be established
successfully. The provided taxonomy is extendable and can be used in further
application areas as research on new security technologies.
Related papers
- Hybrid Tabletop Exercise (TTX) based on a Mathematical Simulation-based Model for the Maritime Sector [0.0]
There is a need for targeted cybersecurity education to enhance executive decision-making and crisis response.<n>Traditional training methods, such as cyber wargames and Tabletop Exercises (TTX), aim to develop abilities to face critical incidents.<n>This paper presents a novel approach to cybersecurity and cyberdefense education through the design of a specialized hybrid TTX for the maritime domain.
arXiv Detail & Related papers (2026-02-17T19:49:18Z) - Bridging Cybersecurity Practice and Law: a Hands-on, Scenario-Based Curriculum Using the NICE Framework to Foster Skill Development [0.2555114504478013]
This paper identifies the most frequent attack vectors for small-medium businesses (SMBs)<n>It proposes a practical model of both technical and non-technical tasks, knowledge, skills, abilities (TKSA) from the NICE Framework for those attacks.<n>By immersing learners in realistic cyber threat scenarios, their practical understanding and preparedness in responding cybersecurity incidents is enhanced.
arXiv Detail & Related papers (2025-09-21T22:36:30Z) - In-person, Online and Back Again -- A Tale of Three Hybrid Hackathons [88.07897892705796]
Hybrid hackathons combine in-person and online participation, presenting unique challenges for organizers and participants.<n>Existing strategies for in-person or online-only events often fail to address the challenges of hybrid formats.<n>Our work examines how hybrid hackathons function, analyzing how organizers structure these events and how participants navigate hybrid-specific challenges.
arXiv Detail & Related papers (2025-08-10T11:27:01Z) - Report on NSF Workshop on Science of Safe AI [75.96202715567088]
New advances in machine learning are leading to new opportunities to develop technology-based solutions to societal problems.<n>To fulfill the promise of AI, we must address how to develop AI-based systems that are accurate and performant but also safe and trustworthy.<n>This report is the result of the discussions in the working groups that addressed different aspects of safety at the workshop.
arXiv Detail & Related papers (2025-06-24T18:55:29Z) - CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber Defenders [11.398093058037011]
CyberAlly is a knowledge graph-enhanced AI assistant designed to enhance the efficiency and effectiveness of Blue Teams during incident response.
integrated into our cyber range alongside an open-source SIEM platform, CyberAlly monitors alerts, tracks Blue Team actions, and suggests tailored mitigation recommendations.
arXiv Detail & Related papers (2025-04-10T05:03:56Z) - Interactive cybersecurity training system based on simulation environments [0.0]
The article explores the possibilities of integrating simulation environments into the cybersecurity training process.
The article describes the implementation of various open source software tools based on the number of cyber threats.
arXiv Detail & Related papers (2024-12-30T23:45:10Z) - Towards Type Agnostic Cyber Defense Agents [0.0]
Cyber threats have continued to grow, leading to labor shortages and a skills gap in cybersecurity.
Many cybersecurity product vendors and security organizations have looked to artificial intelligence to shore up their defenses.
This work considers how to characterize attackers and defenders in one approach to the automation of cyber defense.
arXiv Detail & Related papers (2024-12-02T14:32:18Z) - A Transdisciplinary Approach to Cybersecurity: A Framework for Encouraging Transdisciplinary Thinking [0.0]
Classical cybersecurity is often perceived as a rigid science discipline filled with computer scientists and mathematicians.
Due to the rapid pace of technology development and integration, cybersecurity is quickly beginning to encompass more than just computers.
This paper presents a framework to encourage transdisciplinary thinking and assist experts in tackling the new challenges of the modern day.
arXiv Detail & Related papers (2024-05-16T18:12:50Z) - SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification, and Learning Analytics to Train Cybersecurity Competencies [0.6749750044497732]
One of the most vital tools to train cybersecurity competencies is the Cyber Range.
This paper introduces SCORPION, a fully functional and motivating Cyber Range.
In addition, SCORPION includes several elements to improve student motivation.
arXiv Detail & Related papers (2024-01-23T09:48:15Z) - Navigating Cybersecurity Training: A Comprehensive Review [7.731471533663403]
This survey examines a spectrum of cybersecurity awareness training methods, analyzing traditional, technology-based, and innovative strategies.
It evaluates the principles, efficacy, and constraints of each method, presenting a comparative analysis that highlights their pros and cons.
arXiv Detail & Related papers (2024-01-20T21:14:24Z) - Designing an attack-defense game: how to increase robustness of
financial transaction models via a competition [69.08339915577206]
Given the escalating risks of malicious attacks in the finance sector, understanding adversarial strategies and robust defense mechanisms for machine learning models is critical.
We aim to investigate the current state and dynamics of adversarial attacks and defenses for neural network models that use sequential financial data as the input.
We have designed a competition that allows realistic and detailed investigation of problems in modern financial transaction data.
The participants compete directly against each other, so possible attacks and defenses are examined in close-to-real-life conditions.
arXiv Detail & Related papers (2023-08-22T12:53:09Z) - Proceedings of the 2nd International Workshop on Adaptive Cyber Defense [0.0]
The 2nd International Workshop on Adaptive Cyber Defense was held at the Florida Institute of Technology, Florida.
This workshop was organized to share research that explores unique applications of Artificial Intelligence (AI) and Machine Learning (ML)
The cyber domain cannot currently be reliably and effectively defended without extensive reliance on human experts.
arXiv Detail & Related papers (2023-08-18T12:56:04Z) - Applications of Educational Data Mining and Learning Analytics on Data
From Cybersecurity Training [0.5735035463793008]
This paper surveys publications that enhance cybersecurity education by leveraging trainee-generated data from interactive learning environments.
We identified and examined 3021 papers, ultimately selecting 35 articles for a detailed review.
Our contribution is a systematic literature review of relevant papers and their categorization according to the collected data, analysis methods, and application contexts.
arXiv Detail & Related papers (2023-07-13T19:05:17Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Proceedings of the Artificial Intelligence for Cyber Security (AICS)
Workshop at AAAI 2022 [55.573187938617636]
The workshop will focus on the application of AI to problems in cyber security.
Cyber systems generate large volumes of data, utilizing this effectively is beyond human capabilities.
arXiv Detail & Related papers (2022-02-28T18:27:41Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Automating Privilege Escalation with Deep Reinforcement Learning [71.87228372303453]
In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents.
We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation.
Our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.
arXiv Detail & Related papers (2021-10-04T12:20:46Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.