Filters








18,349 Hits in 9.7 sec

Developing a Cyber Incident Exercises Model to Educate Security Teams

Basil Alothman, Aldanah Alhajraf, Reem Alajmi, Rawan Al Farraj, Nourah Alshareef, Murad Khan
2022 Electronics  
They had to educate the red and blue teams about cyber security and train them on facing cyber attacks.  ...  The proposed model consisted of three teams: (1) the black team, (2) the red team, and (3) the blue team. The black team was a group of instructors responsible for setting up the environment.  ...  Acknowledgments: We sincerely acknowledge the Kuwait College of Science and Technology for supporting and providing a research environment to conduct this study.  ... 
doi:10.3390/electronics11101575 fatcat:vitfhg5injealcwgjxsdvh3kxe

Assessing the effectiveness of cybersecurity training and raising awareness within the maritime domain

Monica Canepa, Fabio Ballini, Dimitrios Dalaklis, Seyedvahid Vakili
2021 Zenodo  
The analysis at hand will initially deliver a literature review in relation to education and training on cybersecurity, with a very dedicated focus on the maritime domain.  ...  The Cyber-MAR Project is focused on hyper-realistic simulation and emulation of maritime systems (e.g.  ...  Therefore, the proposed training program will incorporate a series of dedicated content, interaction, pedagogical framework, and important virtualized exercises for hands-on interplay.  ... 
doi:10.5281/zenodo.5101534 fatcat:zx3kjr7ecvdc5cmtcjnmehspt4

Training the Human-in-the-Loop in Industrial Cyber Ranges [chapter]

Stela Kucek, Maria Leitner
2020 Lecture Notes in Electrical Engineering  
Cyber ranges are virtual environments that mimic realistic networks and systems and can be used for e.g., training, exercises or research.  ...  While current state of the art focuses mostly on technical designs and developments, this paper focuses on assessing and integrating the human-in-the-loop in industrial cyber ranges (i.e. cyber ranges  ...  Hence, this brief review of related work displays that there is a need for dynamic and hands-on training in cyber security in ICS and a vivid research on environments that support various purposes such  ... 
doi:10.1007/978-3-030-48602-0_10 fatcat:vlffojv3lvhknd3puskcblmphy

Cyber security training for critical infrastructure protection: A literature review

Nabin Chowdhury, Vasileios Gkioulos
2021 Computer Science Review  
Objective: In this study, we seek to establish the current state-of-the-art in cyber-security training offerings for critical infrastructure protection and the key performance indicators (KPIs) that allow  ...  Introduction: Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to  ...  Funding This work was supported by the Norwegian Institute of Science and Technology (NTNU).  ... 
doi:10.1016/j.cosrev.2021.100361 fatcat:7h645cftenbjzjlqy3dpljf2bi

An Ensemble Deep Learning-based Cyber-Attack Detection in Industrial Control System

Abdulrahman Al-Abassi, Hadis Karimipour, Ali Dehghantanha, Reza M. Parizi
2020 IEEE Access  
The performance of the proposed model is evaluated based on 10-fold crossvalidation on two real ICS datasets.  ...  Traditional Intrusion Detection Systems (IDSs), which are mainly developed to support information technology systems, count vastly on predefined models and are trained mostly on specific cyber-attacks.  ...  Reference [38] evaluates the application of unsupervised machine learning algorithms, including DNN and SVM, to detect anomalies in the Cyber-Physical System (CPS) using data from a Secure Water Treatment  ... 
doi:10.1109/access.2020.2992249 fatcat:vtudysg4z5fe5f3e2ppylysx7a

How Industrial Control System Security Training is Falling Short [chapter]

Jonathan Butts, Michael Glover
2015 IFIP Advances in Information and Communication Technology  
Acknowledgement This research was partially supported by the Office of the Under Secretary of Defense for Personnel and Readiness.  ...  Analysis of Existing Capabilities. Several government and industry training programs for industrial control system security were evaluated.  ...  Training Facility Evaluation A robust training facility is the key to developing industrial control system security specialists.  ... 
doi:10.1007/978-3-319-26567-4_9 fatcat:qysace64bfh4pa4bn6tx32yqpa

Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees

George Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Ludger Goeke, Torsten Hildebrandt, George Tsakirakis, Fotis Oikonomou, George Leftheriotis, Hristo Koshutanski
2020 Applied Sciences  
The overall method is integrated in a modern cyber-ranges platform, and a pilot training programme for smart shipping employees is presented.  ...  Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those which operate critical infrastructures.  ...  Section 3 sketches the proposed methodology for the design and evaluation of the cyber-security training programme.  ... 
doi:10.3390/app10165702 fatcat:nskf4rvjhnccdoqzuvn7b6gz7a

Index of cyber integrity

Gustave Anderson, Misty Blowers, Jonathan Williams
2014 Machine Intelligence and Bio-inspired Computation: Theory and Applications VIII  
Current state of the art methods for evaluating the security of systems include penetration testing, and cyber evaluation tests.  ...  As a result we are left with ad-hoc methods for generating evaluations of the security of our systems.  ...  Current state of the art methods for evaluating the security of systems include penetration testing, and cyber evaluation tests.  ... 
doi:10.1117/12.2049863 fatcat:mje6hs4o7ng25lzffrjks5raau

Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security [article]

Simran K, Sriram S, Vinayakumar R, Soman KP
2020 arXiv   pre-print
The existing methods on NER for Cyber Security data are based on rules and linguistic characteristics.  ...  In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased.  ...  Acknowledgment This research was supported in part by Paramount Computer Systems and Lakhshya Cyber Security Labs. We are grateful to NVIDIA India, for the GPU  ... 
arXiv:2004.00502v1 fatcat:gt2czyseefa67clkr56aejheru

A Cyber Range for Armed Forces Education

Michal Turčaník
2020 Information & Security An International Journal  
A B S T R A C T : Cyber security is one of the prominent global challenges due to significant increase in the number of cyberattacks over the last few decades.  ...  Cybersecurity awareness and cyber security training are promoted by hyper-realistic virtual environments termed as cyber ranges. This article highlights the concept of a cyber range.  ...  Primary use from point of view of education will be hands-on security courses for students. They will receive realistic experience in cyber security.  ... 
doi:10.11610/isij.4622 fatcat:nyyq3dw42bfupecjjtabkbm42y

An Ensemble Deep Learning-based Cyber-Attack Detection in Industrial Control System [article]

Abdulrahman Al-Abassi and Hadis Karimipour
2020 arXiv   pre-print
The performance of the proposed model is evaluated based on 10-fold cross-validation on two real ICS datasets.  ...  Traditional Intrusion Detection Systems (IDSs), which are mainly developed to support Information Technology (IT) systems, count vastly on predefined models and are trained mostly on specific cyber-attacks  ...  [38] evaluates the application of unsupervised machine learning algorithms, including DNN and SVM, to detect anomalies in the Cyber-Physical System (CPS) using data from a Secure Water Treatment (SWaT  ... 
arXiv:2005.00936v1 fatcat:n3tqa2hpxfbcjnfi7g3xrvqyzi

Cybersecurity Education and Training Support System: CyRIS

Razvan BEURAN, Cuong PHAM, Dat TANG, Ken-ichi CHINEN, Yasuo TAN, Yoichi SHINODA
2018 IEICE transactions on information and systems  
CyRIS uses a text-based representation in YAML format to describe the characteristics of the training environment, including both environment setup and security content generation.  ...  Based on this description, CyRIS automatically creates the corresponding cyber range instances on a computer and network infrastructure, for simultaneous use by multiple trainees.  ...  Acknowledgments We wish to acknowledge the assistance of Yoshio Niimi in performing some of the experiments presented in this paper.  ... 
doi:10.1587/transinf.2017edp7207 fatcat:zbs4fws5mjhu3kpiugrm7skgcm

Novel SHP-ECC Mechanism Architecture for Attack Node Mitigation and to Predict Future Community Intrusions

Sangeetha Prabhu, S. Nethravathi P.
2022 Zenodo  
Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality and security of data in the face of cyber-attacks.  ...  to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry.  ...  Computer infrastructure attacks are becoming a more serious threat [2] . Cyber detection on a network is a critical component of system security.  ... 
doi:10.5281/zenodo.6350840 fatcat:alapsxs7yrafthpgesi7ldjjc4

Digital Transformation and Cybersecurity of Critical Infrastructures

Leandros Maglaras, Ioanna Kantzavelou, Mohamed Amine Ferrag
2021 Applied Sciences  
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of nations [...]  ...  Conflicts of Interest: All authors declare no conflict of interest.  ...  A cyber range system is mainly used for one or more of three main objectives: research, training, and exercises.  ... 
doi:10.3390/app11188357 fatcat:76y7vzvkjrfjpfzebrc2yas77m

IMIDS: An Intelligent Intrusion Detection System against Cyber Threats in IoT

Kim-Hung Le, Minh-Huy Nguyen, Trong-Dat Tran, Ngoc-Duan Tran
2022 Electronics  
On one hand, it brings convenience, simplicity, and efficiency for us; on the other hand, the devices are susceptible to various cyber-attacks due to the lack of solid security mechanisms and hardware  ...  To mitigate the training data shortage issue, we also propose an attack data generator powered by a conditional generative adversarial network.  ...  In [34] , the authors proposed a GAN-based framework to evaluate cyber-attacks on the smart energy grid.  ... 
doi:10.3390/electronics11040524 doaj:d0f7becc6b6a4f82ae419f669842eed5 fatcat:2ldpmofijrbqzfoj5ckotqnffu
« Previous Showing results 1 — 15 out of 18,349 results