SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification, and Learning Analytics to Train Cybersecurity Competencies
- URL: http://arxiv.org/abs/2401.12594v3
- Date: Tue, 19 Nov 2024 10:05:07 GMT
- Title: SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification, and Learning Analytics to Train Cybersecurity Competencies
- Authors: Pantaleone Nespoli, Mariano Albaladejo-González, José A. Ruipérez-Valiente, Joaquin Garcia-Alfaro,
- Abstract summary: One of the most vital tools to train cybersecurity competencies is the Cyber Range.
This paper introduces SCORPION, a fully functional and motivating Cyber Range.
In addition, SCORPION includes several elements to improve student motivation.
- Score: 0.6749750044497732
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: It is undeniable that we are witnessing an unprecedented digital revolution. However, recent years have been characterized by the explosion of cyberattacks, making cybercrime one of the most profitable businesses on the planet. That is why training in cybersecurity is increasingly essential to protect the assets of cyberspace. One of the most vital tools to train cybersecurity competencies is the Cyber Range, a virtualized environment that simulates realistic networks. The paper at hand introduces SCORPION, a fully functional and virtualized Cyber Range, which manages the authoring and automated deployment of scenarios. In addition, SCORPION includes several elements to improve student motivation, such as a gamification system with medals, points, or rankings, among other elements. Such a gamification system includes an adaptive learning module that is able to adapt the cyberexercise based on the users' performance. Moreover, SCORPION leverages learning analytics that collects and processes telemetric and biometric user data, including heart rate through a smartwatch, which is available through a dashboard for instructors. Finally, we developed a case study where SCORPION obtained 82.10% in usability and 4.57 out of 5 in usefulness from the viewpoint of a student and an instructor. The positive evaluation results are promising, indicating that SCORPION can become an effective, motivating, and advanced cybersecurity training tool to help fill current gaps in this context.
Related papers
- PACEbench: A Framework for Evaluating Practical AI Cyber-Exploitation Capabilities [42.61805002268063]
We introduce PACEbench, a practical AI cyber-exploitation benchmark.<n>PACEbench comprises four scenarios spanning single, blended, chained, and defense vulnerability exploitations.<n>We propose PACEagent, a novel agent that emulates human penetration testers by supporting multi-phase reconnaissance, analysis, and exploitation.
arXiv Detail & Related papers (2025-10-13T17:50:25Z) - CyFence: Securing Cyber-Physical Controllers via Trusted Execution Environment [45.86654759872101]
Cyber-physical systems (CPSs) have experienced a significant technological evolution and increased connectivity, at the cost of greater exposure to cyber-attacks.<n>We propose CyFence, a novel architecture that improves the resilience of closed-loop control systems against cyber-attacks by adding a semantic check.<n>We evaluate CyFence considering a real-world application, consisting of an active braking digital controller, demonstrating that it can mitigate different types of attacks with a negligible overhead.
arXiv Detail & Related papers (2025-06-12T12:22:45Z) - CyberGym: Evaluating AI Agents' Real-World Cybersecurity Capabilities at Scale [45.97598662617568]
We introduce CyberGym, a large-scale benchmark featuring 1,507 real-world vulnerabilities across 188 software projects.<n>We show that CyberGym leads to the discovery of 35 zero-day vulnerabilities and 17 historically incomplete patches.<n>These results underscore that CyberGym is not only a robust benchmark for measuring AI's progress in cybersecurity but also a platform for creating direct, real-world security impact.
arXiv Detail & Related papers (2025-06-03T07:35:14Z) - CyberAlly: Leveraging LLMs and Knowledge Graphs to Empower Cyber Defenders [11.398093058037011]
CyberAlly is a knowledge graph-enhanced AI assistant designed to enhance the efficiency and effectiveness of Blue Teams during incident response.
integrated into our cyber range alongside an open-source SIEM platform, CyberAlly monitors alerts, tracks Blue Team actions, and suggests tailored mitigation recommendations.
arXiv Detail & Related papers (2025-04-10T05:03:56Z) - Towards Type Agnostic Cyber Defense Agents [0.0]
Cyber threats have continued to grow, leading to labor shortages and a skills gap in cybersecurity.
Many cybersecurity product vendors and security organizations have looked to artificial intelligence to shore up their defenses.
This work considers how to characterize attackers and defenders in one approach to the automation of cyber defense.
arXiv Detail & Related papers (2024-12-02T14:32:18Z) - Adaptive Robotic Arm Control with a Spiking Recurrent Neural Network on a Digital Accelerator [41.60361484397962]
We present an overview of the system, and a Python framework to use it on a Pynq ZU platform.
We show how the simulated accuracy is preserved with a peak performance of 3.8M events processed per second.
arXiv Detail & Related papers (2024-05-21T14:59:39Z) - Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training [8.492135678037787]
We have developed a framework for modelling a smart grid cyber range using an XML-based language, called SG-ML.
The framework aims at making a smart grid cyber range available to broader user bases to facilitate cybersecurity R&D and hands-on exercises.
arXiv Detail & Related papers (2024-04-01T02:34:53Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Catch Me If You Can: Improving Adversaries in Cyber-Security With
Q-Learning Algorithms [0.7349727826230861]
Attackers disguise their actions and launch attacks that consist of multiple actions, which are difficult to detect.
In this work, we propose a model of an attacking agent and environment and evaluate its performance using basic Q-Learning, Naive Q-learning, and DoubleQ-Learning.
Results show that the DoubleQ-Learning agent has the best overall performance rate by successfully achieving the goal in $70%$ of the interactions.
arXiv Detail & Related papers (2023-02-07T21:57:59Z) - Cyberbullying Indicator as a Precursor to a Cyber Construct Development [0.0]
This study proposes a cyberbullying framework based on the identification of some observable behavioral indicators.
Using a self-administered measurement instrument from 30-respondents, the study observed the probability of a cyberbully construct.
arXiv Detail & Related papers (2022-03-31T07:55:51Z) - Fixed Points in Cyber Space: Rethinking Optimal Evasion Attacks in the
Age of AI-NIDS [70.60975663021952]
We study blackbox adversarial attacks on network classifiers.
We argue that attacker-defender fixed points are themselves general-sum games with complex phase transitions.
We show that a continual learning approach is required to study attacker-defender dynamics.
arXiv Detail & Related papers (2021-11-23T23:42:16Z) - Automating Privilege Escalation with Deep Reinforcement Learning [71.87228372303453]
In this work, we exemplify the potential threat of malicious actors using deep reinforcement learning to train automated agents.
We present an agent that uses a state-of-the-art reinforcement learning algorithm to perform local privilege escalation.
Our agent is usable for generating realistic attack sensor data for training and evaluating intrusion detection systems.
arXiv Detail & Related papers (2021-10-04T12:20:46Z) - Cyber Taxi: A Taxonomy of Interactive Cyber Training and Education
Systems [0.0]
The proposed taxonomy includes different factors of the technical setup, audience, training environment, and training setup.
The provided taxonomy is extendable and can be used in further application areas as research on new security technologies.
arXiv Detail & Related papers (2021-01-14T10:26:46Z) - Machine Learning in Generation, Detection, and Mitigation of
Cyberattacks in Smart Grid: A Survey [1.3299946892361474]
Smart grid (SG) is a complex cyber-physical system that utilizes modern cyber and physical equipment to run at an optimal operating point.
Cyberattacks are the principal threats confronting the usage and advancement of the state-of-the-art systems.
Machine learning (ML) is being used to exploit and defend the cyberattacks in SG by the attackers and system operators.
arXiv Detail & Related papers (2020-09-01T05:16:51Z) - Adversarial Machine Learning Attacks and Defense Methods in the Cyber
Security Domain [58.30296637276011]
This paper summarizes the latest research on adversarial attacks against security solutions based on machine learning techniques.
It is the first to discuss the unique challenges of implementing end-to-end adversarial attacks in the cyber security domain.
arXiv Detail & Related papers (2020-07-05T18:22:40Z) - Dynamic Divide-and-Conquer Adversarial Training for Robust Semantic
Segmentation [79.42338812621874]
Adversarial training is promising for improving robustness of deep neural networks towards adversarial perturbations.
We formulate a general adversarial training procedure that can perform decently on both adversarial and clean samples.
We propose a dynamic divide-and-conquer adversarial training (DDC-AT) strategy to enhance the defense effect.
arXiv Detail & Related papers (2020-03-14T05:06:49Z) - Learn2Perturb: an End-to-end Feature Perturbation Learning to Improve
Adversarial Robustness [79.47619798416194]
Learn2Perturb is an end-to-end feature perturbation learning approach for improving the adversarial robustness of deep neural networks.
Inspired by the Expectation-Maximization, an alternating back-propagation training algorithm is introduced to train the network and noise parameters consecutively.
arXiv Detail & Related papers (2020-03-02T18:27:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.