Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2076732.2076740acmotherconferencesArticle/Chapter ViewAbstractPublication PagesacsacConference Proceedingsconference-collections
research-article

Hit 'em where it hurts: a live security exercise on cyber situational awareness

Published: 05 December 2011 Publication History

Abstract

Live security exercises are a powerful educational tool to motivate students to excel and foster research and development of novel security solutions. Our insight is to design a live security exercise to provide interesting datasets in a specific area of security research. In this paper we validated this insight, and we present the design of a novel kind of live security competition centered on the concept of Cyber Situational Awareness. The competition was carried out in December 2010, and involved 72 teams (900 students) spread across 16 countries, making it the largest educational live security exercise ever performed. We present both the innovative design of this competition and the novel dataset we collected. In addition, we define Cyber Situational Awareness metrics to characterize the toxicity and effectiveness of the attacks performed by the participants with respect to the missions carried out by the targets of the attack.

References

[1]
T. Augustine and R. Dodge. Cyber Defense Exercise: Meeting Learning Objectives thru Competition. In Proceedings of the Colloquium for Information Systems Security Education (CISSE), 2006.
[2]
N. Childers, B. Boe, L. Cavallaro, L. Cavedon, M. Cova, M. Egele, and G. Vigna. Organizing Large Scale Hacking Competitions. In Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Bonn, Germany, July 2010.
[3]
W. Clark. The Gantt chart: A working tool of management. New York: Ronald Press, 1922.
[4]
C. Cowan, S. Arnold, S. Beattie, C. Wright, and J. Viega. Defcon Capture the Flag: defending vulnerable code from intense attack. In Proceedings of the DARPA Information Survivability Conference and Exposition, April 2003.
[5]
A. D'Amico, L. Buchanan, J. Goodall, and P. Walczak. Mission Impact of Cyber Events: Scenarios and Ontology to Express the Relationships between Cyber Assets, Missions and Users. In Proceedings of the International Conference on Information Warfare and Security, Dayton, Ohio, April 2010.
[6]
D. R. Hipp. Sqlite. http://www.sqlite.org/, 2010.
[7]
Justin.tv. http://justin.tv/.
[8]
S. Liang. Java Native Interface: Programmer's Guide and Reference. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1st edition, 1999.
[9]
Mediawiki. http://www.mediawiki.org/.
[10]
B. Mullins, T. Lacey, R. Mills, J. Trechter, and S. Bass. How the Cyber Defense Exercise Shaped an Information-Assurance Curriculum. IEEE Security & Privacy, 5(5), 2007.
[11]
J. Peterson. Petri Nets. ACM Computing Surveys, 9(3), September 1977.
[12]
L. Pimenidis. Cipher: capture the flag. http://www.cipher-ctf.org/, 2008.
[13]
Pwn2own 2009 at cansecwest. http://dvlabs.tippingpoint.com/blog/2009/02/25/pwn2own-2009, March 2009.
[14]
W. Schepens, D. Ragsdale, and J. Surdu. The Cyber Defense Exercise: An Evaluation of the Effectiveness of Information Assurance Education. Black Hat Federal, 2003.
[15]
Simpp. 3vilsh3ll.c. http://packetstormsecurity.org/files/view/64687/3vilSh311.c.
[16]
Snort. http://www.snort.org/.
[17]
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software.
[18]
The HackerDom Group. The ructf challenge. http://www.ructf.org, 2009.
[19]
G. Vigna. Teaching Hands-On Network Security: Testbeds and Live Exercises. Journal of Information Warfare, 3(2):8--25, 2003.
[20]
G. Vigna. Teaching Network Security Through Live Exercises. In C. Irvine and H. Armstrong, editors, Proceedings of the Third Annual World Conference on Information Security Education (WISE 3), pages 3--18, Monterey, CA, June 2003. Kluwer Academic Publishers.
[21]
VMware. http://www.vmware.com/.

Cited By

View all
  • (2024)Towards Customized Cyber Exercises using a Process-based Lifecycle ModelProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655713(37-45)Online publication date: 5-Jun-2024
  • (2024)Automated feedback for participants of hands-on cybersecurity trainingEducation and Information Technologies10.1007/s10639-023-12265-829:9(11555-11584)Online publication date: 1-Jun-2024
  • (2023)Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware DetectorsDigital Threats: Research and Practice10.1145/35674324:2(1-22)Online publication date: 10-Aug-2023
  • Show More Cited By

Index Terms

  1. Hit 'em where it hurts: a live security exercise on cyber situational awareness

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ACSAC '11: Proceedings of the 27th Annual Computer Security Applications Conference
        December 2011
        432 pages
        ISBN:9781450306720
        DOI:10.1145/2076732
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        • ACSA: Applied Computing Security Assoc

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 05 December 2011

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Research-article

        Conference

        ACSAC '11
        Sponsor:
        • ACSA
        ACSAC '11: Annual Computer Security Applications Conference
        December 5 - 9, 2011
        Florida, Orlando, USA

        Acceptance Rates

        Overall Acceptance Rate 104 of 497 submissions, 21%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)10
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 24 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Towards Customized Cyber Exercises using a Process-based Lifecycle ModelProceedings of the 2024 European Interdisciplinary Cybersecurity Conference10.1145/3655693.3655713(37-45)Online publication date: 5-Jun-2024
        • (2024)Automated feedback for participants of hands-on cybersecurity trainingEducation and Information Technologies10.1007/s10639-023-12265-829:9(11555-11584)Online publication date: 1-Jun-2024
        • (2023)Beyond the Hype: An Evaluation of Commercially Available Machine Learning–based Malware DetectorsDigital Threats: Research and Practice10.1145/35674324:2(1-22)Online publication date: 10-Aug-2023
        • (2021)Conceptual Model of Visual Analytics for Hands-on Cybersecurity TrainingIEEE Transactions on Visualization and Computer Graphics10.1109/TVCG.2020.297733627:8(3425-3437)Online publication date: 1-Aug-2021
        • (2021)HackEd: A Pedagogical Analysis of Online Vulnerability Discovery Exercises2021 IEEE Symposium on Security and Privacy (SP)10.1109/SP40001.2021.00092(1268-1285)Online publication date: May-2021
        • (2021)Role and Task Based Model Adaptation for Security Awareness Game2021 International Conference on Quality Management, Transport and Information Security, Information Technologies (IT&QM&IS)10.1109/ITQMIS53292.2021.9642723(773-777)Online publication date: 6-Sep-2021
        • (2020)Build It, Break It, Fix ItACM Transactions on Privacy and Security10.1145/338377323:2(1-36)Online publication date: 17-Apr-2020
        • (2019)Computer-based methods for assessing information security competencies2019 42nd International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)10.23919/MIPRO.2019.8757201(1457-1462)Online publication date: May-2019
        • (2019)Matched and Mismatched SOCsProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security10.1145/3319535.3354239(1955-1970)Online publication date: 6-Nov-2019
        • (2019)Visual Feedback for Players of Multi-Level Capture the Flag Games: Field Usability Study2019 IEEE Symposium on Visualization for Cyber Security (VizSec)10.1109/VizSec48167.2019.9161386(1-11)Online publication date: Oct-2019
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media