Filters








100 Hits in 3.6 sec

KYPO4INDUSTRY

Pavel Čeleda, Jan Vykopal, Valdemar Švábenský, Karel Slavíček
2020 Proceedings of the 51st ACM Technical Symposium on Computer Science Education  
The course uses a flipped classroom format with hands-on projects: the students create educational games that replicate real cyber attacks.  ...  Our described experience from the design of the testbed and its usage can help any educator interested in teaching cybersecurity of cyber-physical systems.  ...  The course uses a flipped classroom format [6] with hands-on projects replicating real cyber attacks.  ... 
doi:10.1145/3328778.3366908 dblp:conf/sigcse/CeledaVSS20 fatcat:urieegetbzgcbiekxkqwlcdxgy

LICSTER – A Low-cost ICS Security Testbed for Education and Research [article]

Felix Sauer and Matthias Niedermaier and Susanne Kießling and Dominik Merli
2019 arXiv   pre-print
However, this shift bears significant risks, namely a larger attack surface, which can be exploited by attackers.  ...  Testbeds are mostly very expensive or based on simulation with no real-world physical process.  ...  Within LICSTER OpenPLC runs on a Raspberry Pi, with our PLC procedure programmed in Structured Text (ST) which is uploaded to the PLC over its own web portal.  ... 
arXiv:1910.00303v1 fatcat:y5rkzbe7r5b4jnfql4v7pexjie

YOU'VE BEEN HACKED: A TECHNIQUE FOR RAISING CYBER SECURITY AWARENESS

2019 Issues in Information Systems  
In today's interconnected world, cyber security is a major concern affecting all corners of cyber space.  ...  The technique leverages young person's interest in gaming, which in itself is a major surface of attack.  ...  Methods to Attack Youth Although youth can be targeted from many places on the web, there are certain places on the web that where they are attacks are more prone to occur including: -Social media web  ... 
doi:10.48009/1_iis_2019_186-194 fatcat:dytu4gey4rhqxjae5oluwaxec4

KYPO Cyber Range: Design and Use Cases

Jan Vykopal, Radek Oslejsek, Pavel Celeda, Martin Vizvary, Daniel Tovarnak
2017 Proceedings of the 12th International Conference on Software Technologies  
The KYPO cyber range provides complex cyber systems and networks in a virtualized, fully controlled and monitored environment.  ...  The physical and cyber worlds are increasingly intertwined and exposed to cyber attacks.  ...  A cyber range provides a place to practice correct and timely responses to cyber attacks.  ... 
doi:10.5220/0006428203100321 dblp:conf/icsoft/VykopalOCVT17 fatcat:lb4stzpftrecvjchqog2oty6r4

Supersensors: Raspberry Pi Devices for Smart Campus Infrastructure

Kristian Hentschel, Dejice Jacob, Jeremy Singer, Matthew Chalmers
2016 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud)  
We describe an approach for developing a campuswide sensor network using commodity single board computers.  ...  In this paper, we describe the initial prototype deployment of our supersensor system in a single department at the University of Glasgow.  ...  The Raspberry Pi device has a variety of interfaces for attaching hardware sensor devices.  ... 
doi:10.1109/ficloud.2016.16 dblp:conf/ficloud/HentschelJSC16 fatcat:ej2srvl5jzh6xd53h7ijbzruxi

Addressing the Security Gap in IoT: Towards an IoT Cyber Range

Oliver Nock, Jonathan Starkey, Constantinos Marios Angelopoulos
2020 Sensors  
The design is focused around the end-user and is based on the four design principles for Cyber Range development discussed in the introduction.  ...  Finally, we demonstrate the use of the facility via a red/blue team scenario involving a variant of man-in-the-middle attack using IoT devices.  ...  It's physical architecture consists of a Raspberry Pi, 4 OpenMote B motes, a screen for output, and a QR code. The Raspberry Pi simply acts as a central server running a single python program.  ... 
doi:10.3390/s20185439 pmid:32971956 fatcat:2dnmj33tuvc7zbwha4f7odra54

A Review of Cyber-Ranges and Test-Beds: Current and Future Trends [article]

Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, Xavier Bellekens
2020 arXiv   pre-print
The foundation of the training provision is the use of Cyber-Ranges (CRs) and Test-Beds (TBs), platforms/tools that help inculcate a deeper understanding of the evolution of an attack and the methodology  ...  cyber-attacks, trends, technologies and mitigation countermeasures has become pressing.  ...  (ISAAC) testbed [124] MITM attack/DoS attack Open source software/Raspberry Pis.  ... 
arXiv:2010.06850v1 fatcat:zgfpqlqvufhinlqymnhdizfoea

Honeypots for employee information security awareness and education training: A conceptual EASY training model [article]

Lek Christopher, Kim-Kwang Raymond Choo, Ali Dehghantanha
2017 arXiv   pre-print
Adapting the Routine Activity Theory, a criminology theory widely used in the study of cybercrime, this paper proposes a conceptual Engaging Stakeholders, Acceptable Behavior, Simple Teaching method, Yardstick  ...  Two honeypots were deployed at a private university based in Singapore. Findings from the analysis of the honeypot data are presented in this paper.  ...  Experiment Setup We set up two honeypots, namely Dionaea [12] and Kippo [13], using Raspberry Pi (see Table 1 ) running on Raspbian, which is a Debian-based operating system.  ... 
arXiv:1706.08043v1 fatcat:3az77fhufjdnrcdsb2e7ycy47i

Using an Event Data Taxonomy to Represent the Impact of Cyber Events as Geometrical Instances

Gustavo Gonzalez-Granadillo, Jose Rubio-Hernan, Joaquin Garcia-Alfaro
2018 IEEE Access  
A use case on the impact assessment of events originated in a critical infrastructure is presented to show the applicability of the proposed taxonomy.  ...  This paper proposes an event data taxonomy based on the system's criticality, the geographical location of the target, the time at which the information is obtained by the attacker, and the nature of the  ...  It consists of a controller (Personal Computer), an RTU (Raspberry Pi) and a PLC (Lego EV3 Brick).  ... 
doi:10.1109/access.2017.2740402 fatcat:zij3s5nxufg4jhuinp2fcd7xte

New Technologies as a Driver for Business Success

Andreas Probst, Gabriele Schachinger, Gerald Kalteis, Armin Fischer
2019 International Journal of Engineering Pedagogy (iJEP)  
In Austria technical education is taught at federal secondary colleges of engineering (HTL) at a quite high level of ISCED 5.  ...  This publication describes the introduction of the IoT platform Thingworx at Austrian HTL for mechanical engineering, with focus on AR and IoT from an educational perspective as well as the training aspects  ...  Sensor and user data and their connection via cloud services to an IoT platform can be manipulated or be the target of cyber-attacks [9] . Bradley et al.  ... 
doi:10.3991/ijep.v9i1.9866 fatcat:rydwmaxvvna2dg7lpltriy7vre

A Novel Attack Detection Scheme for the Industrial Internet of Things using a Lightweight Random Neural Network

Shahid Latif, Zhuo Zou, Zeba Idrees, Jawad Ahmad
2020 IEEE Access  
To predict the aforementioned attacks, a novel lightweight random neural network (RaNN)-based prediction model has been proposed in this article.  ...  The evaluation results show that the proposed RaNN model achieves an accuracy of 99.20% for a learning rate of 0.01, with a prediction time of 34.51 milliseconds.  ...  Raspberry Pi 4 Model B is the latest product in the popular Raspberry Pi series of computers.  ... 
doi:10.1109/access.2020.2994079 fatcat:4px7vjxlbrejde327jggsmqwv4

MoDeS3: Model-Based Demonstrator for Smart and Safe Cyber-Physical Systems [chapter]

András Vörös, Márton Búr, István Ráth, Ákos Horváth, Zoltán Micskei, László Balogh, Bálint Hegyi, Benedek Horváth, Zsolt Mázló, Dániel Varró
2018 Lecture Notes in Computer Science  
MoDeS3 represents a smart transportation system-ofsystems composed of a model railway and a crane which may automatically load and unload cargo from trains where both subsystems need to fulfill functional  ...  We present MoDeS3, a complex research demonstrator illustrating the combined use of model-driven development, formal verification, safety engineering and IoT technologies for smart and safe cyberphysical  ...  It was partially supported by MTA-BME Lendület Research Group on Cyber-Physical Systems the ARTEMIS JU R5-COP project and the NSERC RGPIN-04573-16 project.  ... 
doi:10.1007/978-3-319-77935-5_31 fatcat:7medfqdtq5ehncb4pefvfduyre

On Using Micro-Clouds to Deliver the Fog [article]

Yehia Elkhatib and Barry Porter and Heverson B. Ribeiro and Mohamed Faten Zhani and Junaid Qadir and Etienne Riviere
2017 arXiv   pre-print
Through a number of experiments, we showcase the potential of micro-clouds formed by collections of Raspberry Pi computers to host a range of fog-related applications, particularly for locations where  ...  Cloud computing has demonstrated itself to be a scalable and cost-efficient solution for many real-world applications.  ...  Table 1 : 1 Raspberry Pi machine specifications. Model PCB Processor Cache (kB) Memory Power Ver.  ... 
arXiv:1703.00375v1 fatcat:zcscllg765arjhv4qypmmqhtxq

Artificial Neural Networks Based Intrusion Detection System for Internet of Things Fog Nodes

Jesus Pacheco, Victor H. Benitez, L. C. Filix-Herran, Pratik Satam
2020 IEEE Access  
This paper introduces an Anomaly Behavior Analysis Methodology based on Artificial Neural Networks, to implement an adaptive Intrusion Detection System (IDS) capable of detecting when a Fog node has been  ...  capability for characterizing the normal behavior of Fog Nodes despite its complexity due to the adaptive scheme, and also has the capability of detecting anomalies due to any kind of sources such as misuses, cyber-attacks  ...  This work focuses on the security of a Fog node (Gateway) implemented on a Raspberry Pi 3 configured to perform communications between other Fog nodes and IoT subsystems such as the Smart Water Testbed  ... 
doi:10.1109/access.2020.2988055 fatcat:jbdbirrcljgdbffdpjex56emhu

Research Study on Significance of Gamification Learning and i- Campus Using Internet of Things Technology-Enabled Infrastructure [chapter]

Veeramanickam Murugappan, Debnath Bhattacharyya, Tai-hoon Kim
2018 Trends in E-learning  
It's emphasis on the need for both approaches in a single platform to the learners for efficient and smart learning environments to set up.  ...  in educational institutes and gamification-based learning to be an integral part of the Internet of Thing (IoT) enabled the smart campus to explain its significance in terms using modern technology in teaching  ...  Here Raspberry Pi is used to communicate with application to collect data from classroom teaching and learning model.  ... 
doi:10.5772/intechopen.75744 fatcat:bsy3onttdne6dlpb4avolhde44
« Previous Showing results 1 — 15 out of 100 results