Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14610%2F17%3A00094479" target="_blank" >RIV/00216224:14610/17:00094479 - isvavai.cz</a>
Result on the web
<a href="https://is.muni.cz/repo/1391675/2017-FIE-lessons-learned-exercises-cyber-range-paper.pdf" target="_blank" >https://is.muni.cz/repo/1391675/2017-FIE-lessons-learned-exercises-cyber-range-paper.pdf</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1109/FIE.2017.8190713" target="_blank" >10.1109/FIE.2017.8190713</a>
Alternative languages
Result language
angličtina
Original language name
Lessons Learned From Complex Hands-on Defence Exercises in a Cyber Range
Original language description
We need more skilled cybersecurity professionals because the number of cyber threats and ingenuity of attackers is ever growing. Knowledge and skills required for cyber defence can be developed and exercised by lectures and lab sessions, or by active learning, which is seen as a promising and attractive alternative. In this paper, we present experience gained from the preparation and execution of cyber defence exercises involving various participants in a cyber range. The exercises follow a Red vs. Blue team format, in which the Red team conducts malicious activities against emulated networks and systems that have to be defended by Blue teams of learners. Although this exercise format is popular and used worldwide by numerous organizers in practice, it has been sparsely researched. We contribute to the topic by describing the general exercise life cycle, covering the exercise's development, dry run, execution, evaluation, and repetition. Each phase brings several challenges that exercise organizers have to deal with. We present lessons learned that can help organizers to prepare, run and repeat successful events systematically, with lower effort and costs, and avoid a trial-and-error approach that is often used.
Czech name
—
Czech description
—
Classification
Type
D - Article in proceedings
CEP classification
—
OECD FORD branch
10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)
Result continuities
Project
<a href="/en/project/VI20162019014" target="_blank" >VI20162019014: Simulation, detection, and mitigation of cyber threats endangering critical infrastructure</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2017
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Article name in the collection
2017 IEEE Frontiers in Education Conference
ISBN
9781509059195
ISSN
1539-4565
e-ISSN
—
Number of pages
8
Pages from-to
1-8
Publisher name
IEEE
Place of publication
Indianapolis, IN, USA
Event location
Indianapolis, USA
Event date
Jan 1, 2017
Type of event by nationality
WRD - Celosvětová akce
UT code for WoS article
000426974900279