Skip to main content

2020 | OriginalPaper | Buchkapitel

The THREAT-ARREST Cyber-Security Training Platform

verfasst von : Othonas Soultatos, Konstantinos Fysarakis, George Spanoudakis, Hristo Koshutanski, Ernesto Damiani, Kristian Beckers, Dirk Wortmann, George Bravos, Menelaos Ioannidis

Erschienen in: Computer Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization’s system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
6.
Zurück zum Zitat Al-Ghamdi, A.S.A.-M.: A survey on software security testing techniques. Int. J. Comput. Sci. Telecommun. 4(4), 14–18 (2013) Al-Ghamdi, A.S.A.-M.: A survey on software security testing techniques. Int. J. Comput. Sci. Telecommun. 4(4), 14–18 (2013)
7.
Zurück zum Zitat Salas, M.I.P., Martins, E.: Security testing methodologies for vulnerabilities detection of XSS in web services and WS-security. Electron. Notes Theor. Comput. Sci. 302, 133–154 (2014)CrossRef Salas, M.I.P., Martins, E.: Security testing methodologies for vulnerabilities detection of XSS in web services and WS-security. Electron. Notes Theor. Comput. Sci. 302, 133–154 (2014)CrossRef
8.
Zurück zum Zitat Hatzivasilis, G., et al.: AmbISPDM. Appl. Intell. 48(6), 1623–1643 (2017)CrossRef Hatzivasilis, G., et al.: AmbISPDM. Appl. Intell. 48(6), 1623–1643 (2017)CrossRef
9.
Zurück zum Zitat Santa, I.: A users’ guide: how to raise information security awareness. ENISA Rep. 1–140 (2010) Santa, I.: A users’ guide: how to raise information security awareness. ENISA Rep. 1–140 (2010)
11.
Zurück zum Zitat Bird, J., Kim, F.: Survey on application security programs and practices. SANS Anal. Surv. 1–24 (2014) Bird, J., Kim, F.: Survey on application security programs and practices. SANS Anal. Surv. 1–24 (2014)
12.
Zurück zum Zitat Trustwave: Security testing practices and priorities. An Osterman Res. Surv. Rep. 1–15 (2016) Trustwave: Security testing practices and priorities. An Osterman Res. Surv. Rep. 1–15 (2016)
13.
Zurück zum Zitat Hatzivasilis, G., et al.: WARDOG: Awareness detection watchdog for Botnet infection on the host device. IEEE Trans. Sustain. Comput. Spec. Issue Sustain. Inf. Forensic Comput. 1–18 (2019) Hatzivasilis, G., et al.: WARDOG: Awareness detection watchdog for Botnet infection on the host device. IEEE Trans. Sustain. Comput. Spec. Issue Sustain. Inf. Forensic Comput. 1–18 (2019)
14.
Zurück zum Zitat Hatzivasilis, G., Fysarakis, K., Askoxylakis, I., Bilanakos, A.: CloudNet anti-malware engine: GPU-accelerated network monitoring for cloud services. In: Fournaris, A.P., Lampropoulos, K., Marín Tordera, E. (eds.) IOSec 2018. LNCS, vol. 11398, pp. 122–133. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12085-6_11CrossRef Hatzivasilis, G., Fysarakis, K., Askoxylakis, I., Bilanakos, A.: CloudNet anti-malware engine: GPU-accelerated network monitoring for cloud services. In: Fournaris, A.P., Lampropoulos, K., Marín Tordera, E. (eds.) IOSec 2018. LNCS, vol. 11398, pp. 122–133. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-12085-6_​11CrossRef
15.
Zurück zum Zitat Hatzivasilis, G.: Password-hashing status. Cryptography 1(2), 1–31 (2017). MDPI Open Access Journal, number 10 Hatzivasilis, G.: Password-hashing status. Cryptography 1(2), 1–31 (2017). MDPI Open Access Journal, number 10
16.
Zurück zum Zitat Shillair, R., et al.: Online safety begins with you and me: convincing Internet users to protect themselves. Comput. Hum. Behav. 48, 199–207 (2015)CrossRef Shillair, R., et al.: Online safety begins with you and me: convincing Internet users to protect themselves. Comput. Hum. Behav. 48, 199–207 (2015)CrossRef
17.
Zurück zum Zitat Safa, N.S., Rossouw, V.S.: An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57, 442–451 (2016)CrossRef Safa, N.S., Rossouw, V.S.: An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57, 442–451 (2016)CrossRef
18.
Zurück zum Zitat Beckers, K., Pape, S., Fries, V.: HATCH: hack and trick capricious humans – a serious game on social engineering. In: HCI Conference Fusion, Bournemouth, UK, pp. 1–3 (2016) Beckers, K., Pape, S., Fries, V.: HATCH: hack and trick capricious humans – a serious game on social engineering. In: HCI Conference Fusion, Bournemouth, UK, pp. 1–3 (2016)
19.
Zurück zum Zitat Boopathi, K., Sreejith, S., Bithin, A.: Learning cyber security through gamification. Indian J. Sci. Technol. 8(7), 642–649 (2015)CrossRef Boopathi, K., Sreejith, S., Bithin, A.: Learning cyber security through gamification. Indian J. Sci. Technol. 8(7), 642–649 (2015)CrossRef
20.
Zurück zum Zitat Schreuders, Z.C., Butterfield, E.: Gamification for teaching and learning computer security in higher education. In: ASE, USENIX, Austin, TX, USA, pp. 1–8 (2016) Schreuders, Z.C., Butterfield, E.: Gamification for teaching and learning computer security in higher education. In: ASE, USENIX, Austin, TX, USA, pp. 1–8 (2016)
30.
Zurück zum Zitat Bundesamt für Sicherheit in der Informationstechnik (BSI)/Federal Office for Information Security, Germany. Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) (2013) Bundesamt für Sicherheit in der Informationstechnik (BSI)/Federal Office for Information Security, Germany. Protection Profile for the Security Module of a Smart Meter Gateway (Security Module PP) (2013)
31.
Zurück zum Zitat Katopodis, S., Spanoudakis, G., Mahbub, K.: Towards hybrid cloud service certification models. In: International Conference on Services Computing, pp. 394–399 (June 2014) Katopodis, S., Spanoudakis, G., Mahbub, K.: Towards hybrid cloud service certification models. In: International Conference on Services Computing, pp. 394–399 (June 2014)
32.
Zurück zum Zitat Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: Software security, privacy and dependability: metrics and measurement. IEEE Softw. 33(4), 46–54 (2016)CrossRef Hatzivasilis, G., Papaefstathiou, I., Manifavas, C.: Software security, privacy and dependability: metrics and measurement. IEEE Softw. 33(4), 46–54 (2016)CrossRef
33.
Zurück zum Zitat Cichonski, P., et al.: Computer security incident handling guide. NIST Spec. Publ. 800(61), 1–79 (2012) Cichonski, P., et al.: Computer security incident handling guide. NIST Spec. Publ. 800(61), 1–79 (2012)
Metadaten
Titel
The THREAT-ARREST Cyber-Security Training Platform
verfasst von
Othonas Soultatos
Konstantinos Fysarakis
George Spanoudakis
Hristo Koshutanski
Ernesto Damiani
Kristian Beckers
Dirk Wortmann
George Bravos
Menelaos Ioannidis
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-42051-2_14