ArticlePDF Available

Abstract and Figures

Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet of Things. However, mainstream and sophisticated attacks are remaining a threat, both for individuals and organisations. Cyber Range emerges as a promising solution to effectively train people in cybersecurity aspects. A Training Programme is considered adequate only if it can adapt to the scope of the attacks they cover and if the trainees apply the learning material to the operational system. Therefore, this study introduces the model-driven CYber Range Assurance platform (CYRA). The solution allows a trainee to be trained for known and new cyber-attacks by adapting to the continuously evolving threat landscape and examines if the trainees transfer the acquired knowledge to the working environment. Furthermore, this paper presents a use case on an operational backend ICT system, showing how the CYRA platform was utilised to increase the security posture of the organisation.
Content may be subject to copyright.
applied
sciences
Article
CYRA: A Model-Driven CYber Range Assurance Platform
Michail Smyrlis 1,2,* , Iason Somarakis 1,2 , George Spanoudakis 2, George Hatzivasilis 3
and Sotiris Ioannidis 3


Citation: Smyrlis, M.; Somarakis, I.;
Spanoudakis, G.; Hatzivasilis, G.;
Ioannidis I. CYRA: A Model-Driven
CYber Range Assurance Platform.
Appl. Sci. 2021,11, 5165. https://
doi.org/10.3390/app11115165
Academic Editor: José Machado
Received: 30 April 2021
Accepted: 29 May 2021
Published: 2 June 2021
Publisher’s Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2021 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
1Sphynx Technology Solutions AG, 6300 Zug, Switzerland; somarakis@sphynx.ch
2Department of Computer Science, City University of London, London EC1V 0HB, UK;
g.e.spanoudakis@city.ac.uk
3Institute of Computer Science, Foundation for Research and Technology, 700 13 Heraklion, Greece;
hatzivas@ics.forth.gr (G.H.); sotiris@ics.forth.gr (S.I.)
*Correspondence: smyrlis@sphynx.ch or Michail.Smyrlis.2@city.ac.uk
Featured Application: Internet of Things, Industrial Internet of Things and 5G Cyber Range.
Abstract:
Digital technologies are facilitating our daily activities, and thus leading to the social
transformation with the upcoming 5G communications and the Internet of Things. However, main-
stream and sophisticated attacks are remaining a threat, both for individuals and organisations.
Cyber Range emerges as a promising solution to effectively train people in cybersecurity aspects.
A Training Programme is considered adequate only if it can adapt to the scope of the attacks they
cover and if the trainees apply the learning material to the operational system. Therefore, this study
introduces the model-driven CYber Range Assurance platform (CYRA). The solution allows a trainee
to be trained for known and new cyber-attacks by adapting to the continuously evolving threat
landscape and examines if the trainees transfer the acquired knowledge to the working environment.
Furthermore, this paper presents a use case on an operational backend ICT system, showing how the
CYRA platform was utilised to increase the security posture of the organisation.
Keywords:
cyber-ranges; cybersecurity; security assurance; training programmes; CTTP models;
CTTP programmes; adaptation; training; education; security awareness
1. Introduction
Cyber Ranges aims to provide advanced cybersecurity training exercises for both
cybersecurity professionals and individuals regardless of their security expertise. Un-
fortunately, cybercriminals constantly improve their techniques and launch impactful
attacks that affect both organisations and individuals, leading to an ever-changing threat
landscape [1,2]. This is exacerbated nowadays by the complexity of the modern 5G, Inter-
net of Things (IoT), and Industrial IoT (IIoT) systems and the lack of security awareness,
as users are not able to promptly identify and minimise the impact of a cyberattack and
instead act as enablers for the various threat actors to successfully deploy attacks [
1
,
3
,
4
].
According to the UK’s 2021’s Cyber Security Breaches Survey [
5
], four in ten businesses
(39%) and a quarter of charities (26%) report having cybersecurity breaches or attacks in the
last 12 months. Even though fewer businesses are identifying breaches or attacks than in
2020 (46%), the risk level is potentially higher than ever under COVID-19, making it harder
for businesses to administer cybersecurity measures during the pandemic. One of the
survey’s key findings was unprepared staff risk being caught unaware. More specifically,
only a total of 14% of organisations train their staff on cybersecurity, and 20% have tested
their staff response through Cyber Range exercises. Further to this, Cybint [
6
] states that
95% of cybersecurity breaches are due to human error.
That being said, cyber-criminals and hackers will try to infiltrate an organisation
through its weakest link. The need for not only more skilled cybersecurity professionals
but also well-trained individuals regardless of their security expertise is ever-increasing.
Appl. Sci. 2021,11, 5165. https://doi.org/10.3390/app11115165 https://www.mdpi.com/journal/applsci
Appl. Sci. 2021,11, 5165 2 of 28
Organisations devote significant efforts concerning money and time for training to
enhance the personnel’s job-related competencies [
7
9
]. Relevant investments all over
the world are continuously increasing, as well as the demand for advanced and effective
Training Programmes. Therefore, it is now becoming mandatory for the training provider,
to provide evidence that training activities are being fully realised and ensure the training
leads to to designated work competencies, such as increases in the security level or the
operational performance of the organisation [8,10,11].
Information security training can raise the organisation’s awareness among employees
concerning the best practices for cybersecurity and privacy [
11
13
]. Although training
and awareness are still critical for all organisations, they also constitute two of the most
neglected areas of cybersecurity. Based on relevant researches, only 50% of companies
perform some security training programme periodically [
14
]. Moreover, such programmes
are usually encountered by the personnel and the high-level management just as another
element on the checklist that has to be fulfilled [
15
]. Thus, there is no sufficient effort to
assess whether employees benefited from a programme or not or if they are applying the
learned practices and the acquired skills in their day-to-day activities.
The SANS Institute is highlighting in several of its reports the challenges that must
be tackled by businesses providing security training, including programmes of support,
time, and resources by people and departments in their customers’ organisations [
16
].
Academic researchers have also proven that the training efforts can benefit individuals and
organisations only when the newly acquired competencies and skills are transferred to
the working environment [7,10]. Henceforth, the necessity to analyse and understand the
consequences and antecedents of this training process transfer is emerging.
Regarding cyber-security training, although there is an increasing demand for modern
Cyber-Range platforms with advance technical features (e.g., emulation, simulation, serious
gaming), the transfer of the learned skills and the adjustment of the organisation’s operation
has been completely overlooked in almost all cases [1719].
This study presents CYRA, a model-driven CYber Range Assurance Platform that
allows (i) the continuous security assurance of the actual operating system, and (ii) the
dynamic adaptation of the training procedures in the virtual cyber ranges environment.
Initially, the organisation’s technical assets and operational aspects are evaluated via
automated and semi-automated mechanisms. Then, the actual security posture is disclosed
and security Key Performance Indicators (KPIs) are defined, representing the desired level
of protection that we want to accomplish through training. A relevant Cyber Threat and
Training Preparation (CTTP) Programme is developed and the main training is begun.
Throughout this process, the installed analysis mechanisms, from the initial phase, are
continuously assessing wherever the trainees are applying the learned concepts in the
actual system. If not, indications are provided to the trainer and the training procedures
are adapted based on fully- or semi-automated techniques. Meanwhile, the deployed
mechanisms may discover new threats that were not recognised before and drive the
creation of additional training content.
The proposed solution has been successfully deployed in three Information and
Communications Technology (ICT) domains of smart transportation, smart energy, and
healthcare. For each of these pilots, three complete Training Programmes have been created,
namely: “security awareness” for staff with no or low-security knowledge, “edge system
security administrator” for personnel that require main security knowledge concerning
the setting and usage of edge systems, and “backend security manager” for security
and privacy experts. The platform has been evaluated under real operational conditions
where cyber-range training was provided to actual employees. The security KPIs were
set in advance, and the trainers guided the trainees to accomplish them and adapt this
knowledge back in their workplace. The main training life-cycle has been presented in
our previous works [
20
], while this paper concentrates on the aforementioned modules for
CTTP Models and Training Programmes adaptation and continuous security assurance in
the operational system.
Appl. Sci. 2021,11, 5165 3 of 28
The rest of the paper is organised as follows. Section 2overviews the related studies
in this field. Section 3describes the Cyber-Range Assurance Platform. Section 4details
the creation of training programmes and their underlying elements. Section 5presents
the proposed adaptation tool of the platform and Section 6a demonstration example.
Section 7outlines an evaluation analysis, where external trainers utilise the CTTP models
and programmes editor and assess its usability and user-friendliness. Finally, Section 8
provides the concluding remarks and pointers to future work.
2. Related Works
2.1. Adopting Training in the Workplace
One of the main concerns of noncompliance of the personnel with the defined security
policies for an organisation constitutes the main concern [
12
,
18
,
21
]. If employees do not
fully comply with these policies, the efficacy of the relevant protection mechanisms is
lost. From the various compliance approaches, effective training is considered the most
commonly proposed solution. Nevertheless, only a few of the existing studies evaluate the
results of professional training in organisations and promote policies for compliance in the
working environment [
12
,
18
]. The theory is rarely utilised to explain what factors are affect-
ing users’ compliance with security policies or even provide empirical evidence from their
actual application. In general, it is suggested that training programmes should make use of
methods and contents that are actively engaging trainees and motivate them to undergo
systematic cognitive processing of the taught information [
17
,
20
]. Apart from modern
technological tools (e.g., simulation, serious games), the continuous communication of the
trainer with the learners is vital to improving users’ security compliance [12,17,20].
Researches for security training ordinarily incorporate pedagogical principles as the
primary methodology to enhance the user’s compliance [
18
,
20
,
21
]. In 1998, Baldwin and
Ford [22]
defined the transfer of learning to the working environment as “the degree to
which trainees effectively apply the knowledge, skills, and attitudes gained in the training
context to the job”. A simplified illustration of the training transfer model is depicted in
Figure 1.
Figure 1. Transfer of training.
However, it is estimated that around 10–40% of all training experiences will be trans-
ferred to the workplace [
7
,
17
,
18
]. Moreover, as time passes from the completion of the
training programme, employees usually becoming less motivated to retain the new oper-
ational behaviours (e.g., after one year). Based on the currently provided methods and
training solutions, only a small percent of the desired training outcomes will be perma-
nently transferred to the working environment. Thereupon, enhancing the learning transfer
becomes the main concern for modern cybersecurity training platforms, which is also one
of the main targets of this study and the proposed continuous assurance and adaptation
mechanisms that are detailed in the next sections.
Appl. Sci. 2021,11, 5165 4 of 28
2.2. Cyber Ranges Platforms
Surveys for cybersecurity training in critical infrastructures, such as aviation, trans-
portation, healthcare, energy, and nuclear sectors, are presented in [
17
20
]. In the last
few years, there has been an increasing demand for cybersecurity professionals, which is
expected to continue to grow [
17
]. Cyber Ranges are a promising solution for advanced
training that can fill the gap by incorporating educational courses with hands-on experience.
Most of these platforms are implementing automated tools to facilitate the develop-
ment of virtual labs and scenarios, as well as the adequate means to assess the
trainees [
19
,
20
]. Karlzen had identified and surveyed the automation trends of 74 cy-
ber ranges platforms [19].
Fourteen of these platforms are deploying such automated modules. The Austrian
AIT Cyber Range utilises automation for the instantiation of virtual machines (VMs) during
capture-the-flag (CTF) competitions [
23
]. During such events, it also uses a module called
GameMaker, as the scenario engine for the execution of injections [
24
]. NATO’s Cooperative
Cyber Defence Centre of Excellence (CCDCOE) cyber ranges platform utilises the tool
suite EVE and ADAM for situational awareness during exercises [
25
]. The CCDCOE
platform can also combine an automated availability scoring module [
26
]. Cyber Conflict
Exercise [
27
] marshals a series of automated tools that are needed for cyber ranges. These
include components for system configuration and deployment, attack execution, updating
of flags, visualisation of changes in the emulated setting, and scoring. The CyTRONE
platform incorporates a module, called CyRIS (Cyber Range Instantiation System) [
28
],
for the automated configuration and deployment of services and systems in the training
environment. Then, additional modules are used for the execution of attacks [29].
The DETERLab platform deploys virtual training environments based on abstract test
definitions [
30
] and develops the Montage AGent Infrastructure (MAGI) for the automatic
run of tests [
30
]. The Emulab platform allocates the hardware resources, sets the network-
ing parameters, and executes other automated events [
31
], while the Linktest module can
validate the generated emulated elements [
32
]. Similarly, KYPO uses the PM Portal module
to set up and control the deployed exercises [
33
], while additional tools perform automated
attacks in the virtual system and evaluation of the trainees. The LARIAT platform includes
the Automatic Live Instantiation of a Virtual Environment (ALIVE) module for the config-
uration and instantiation of VMs for the emulated setting [
34
]. This includes the emulation
of standardised network services, websites, and email services, etc.
The above-mentioned findings show that the existing educational solutions for cy-
bersecurity are mostly concerned with the training environment configuration while the
transfer of the learned concepts in the workplace is neglected. In the work presented in [
20
],
the authors introduced a platform, developed under the EU-funded THREAT-ARREST
project, where the trainee has the chance to be trained to counter advanced, known, and
new cyber-attacks. CYRA acts as a continuation of this work that not only trains a user
against several attacks through organisation-specific or generic training programmes but it
also (a) investigates if the gained knowledge was applied to increase the security posture
of an actual cyber system (if the trainee was part of an organisation) and (b) adopts the
existing training programmes or creates new ones by following the adaptation procedures
described in Section 5.
3. The CYber Range Assurance Platform (CYRA)
CYRA (see Figure 2) is a combination of three main components namely, Sphynx’s
Security Assurance Platform, the CTTP models and programmes editor and the CTTP
Models and Programmes adaptation tool and was developed by Sphynx Technology
Solutions AG (https://www.sphynx.ch/ (accessed on 23 April 2021)).
Appl. Sci. 2021,11, 5165 5 of 28
Figure 2. CYRA’s architecture.
These components work together to provide Cyber Range training programmes that
(a) can train users to understand the ever-increasing threat landscape, (b) are tailored to an
organisations needs (based on the use of the Security Assurance Platform) and (c) can be
adopted to upcoming cyber threats and/or changes of the assessed cyber systems. More
details for the three mentioned components can be found below.
Sphynx’s Security Assurance Platform is a suite of various tools and technologies
that enables clients to realise security assessments based on industrial and interna-
tional standards (e.g., cloud, network, smart metering standards) through continuous
monitoring and testing. The platform’s main components are:
Asset Loader: The component responsible for receiving the cyber system’s asset
model for the target organisation. This model includes the assets of the organisa-
tion, security properties for these assets, threats that may violate these properties
and the security controls that protect the assets.
Monitoring Module: A runtime monitoring engine built in Java that offers an API
for establishing monitoring rules to be checked. This module is made of three
sub-modules: a monitor manager, a monitor, and an event collector. The role of
the module is to forward the runtime events from the application’s monitored
properties and finally obtain the monitoring results.
Dynamic Testing Module: The Dynamic Testing Module utilises a combination
of various open-source penetration testing tools to execute different types of
penetration testing assessments. The module actively interacts with a target
system to discover vulnerabilities and determine if the vulnerabilities are ex-
ploitable. In addition, the module supports the uploading of a report generated
from different types of tools and populates the assurance platform based on their
results. Finally, as additional functionality, the module can discover and report
assets that were not defined in the current asset model of the system.
Appl. Sci. 2021,11, 5165 6 of 28
Vulnerability Loader Module: The component responsible for loading the known
vulnerabilities (of the identified assets) and updating the assurance platform
depending on the organisation’s assets included in the assurance model.
Event Captor: Event Captor is a tool that, based on collected data and triggering
events, formulates a rule or a set of rules and pushes the latter towards moni-
toring the module for evaluation. Data and events are mostly collected through
Elastisearch (https://www.elastic.co/ (accessed on 20 April 2021)) based on
lightweight shippers (namely Beats), such as Filebeat, MetricBeat, and Packet-
Beat, that forwards and centralise log data. Data can also be collected through
Logstash, an open server-side data processing pipeline that ingests data from a
multitude of sources, transforms it, and then sends it to ElasticSearch. Event cap-
tor’s are initiated through REST calls from the monitoring module respectively.
The CTTP Model and Programmes Editor is responsible for creating the CTTP Models
and Training Programmes. The editor is offered as a web service through the Cyber
Range Platform.
Lastly, the CTTP Models and Programmes adaptation tool is the tool responsible
for adapting the existing training programmes and models or creating new ones in
response to upcoming cyber threats and/or changes of the assessed cyber systems.
4. Cyber Threat and Training (CTTP) Models and Programmes
The Cyber Range approach presented herein incorporates emulation, simulation, data
fabrication, and serious gaming tools that prepare end-users in defending high-risk cy-
ber systems and organisations to counter advanced, known, and new cyber-attacks. At
the core of our model-driven Cyber Range approach (see Figure 3) is the creation of the
CTTP Models. A CTTP Model specifies the potential attacks, the security controls of cyber
systems against them, and the tools that may be used to assess the effectiveness of these
controls. It also drives the training process and aligns it (where possible) with operational
cyber system security assurance mechanisms to ensure the relevance of training. The first
version of the CTTP models was described in [
1
]. Subsequently, the authors expanded
the CTTP models by adding several attributes that would allow for a better description
of the execution tools and the incorporation of security controls and re-structured the
CTTP Programmes to better provide its educational scope. Having said that, the CTTP
Programme structure is as follows:
CT T P Tr a ini ng Pr o gra m me
Tr a ini n g Pr o gra m me Co n ten t (1. . *)
Edu c at i ona l M ate ria l ( 1. . *)
Eva l ua t ion R e po r t (0 . .1 )
Tr a ini n g Sc e nar i o (0 . .1 )
Co r e cy b er system a s se t m od e l (0 . .1 )
CT T P Mo d el ( 1 .. * )
To this end, a training programme (course) is made up of one or more training pro-
gramme contents (thematic lecture and/or virtual lab). The content can include one or more
educational materials (e.g., guidelines, handouts), which in turn can contain an evaluation
report that the trainee will need to answer to be evaluated on the provided material. The
content can also contain a training scenario. The latter includes the organisation’s core
cyber system asset model (if the scenario was created for an organisation) and one or more
CTTP models defining the tools that will be used for the realisation of the scenario. A
training scenario has (at a minimum) two compulsory parts namely: (a) the training delivery
parameter model and (b) the core cyber system asset model and the emulation,simulation,serious
game,data fabrication models or a combination of them. If a training programme is created
for an organisation, the organisation’s core cyber system asset model is also compulsory.
The next subsections contain a brief description of the above-mentioned terms.
Appl. Sci. 2021,11, 5165 7 of 28
Figure 3. CYRA’s UML representation.
Appl. Sci. 2021,11, 5165 8 of 28
4.1. Training Programme
A training programme provides a structured learning path for a trainee, as it includes
training programme content focusing on particular threats, cyber system components, and
assessment tools of a CTTP model and is being used to drive (along with the CTTP Models)
the execution of the simulation, emulation, and serious gaming processes.
A training programme includes a number of parameters (required or optional) used
to serve different purposes. The basic information of a Programme is: (a) its name, (b)
an introduction that allows the trainee to understand the scope of the programme, (c)
its purposes (based on ECSO’s taxonomy [
35
], (d) its vertical sectors (based on ECSO’s
Domains), (e) its targeted users (based on NIST NICE Work Roles (https://www.nist.gov/
itl/applied-cybersecurity/nice/nice-framework-resource-center (accessed on 20 April
2021))), (f) its offering level (based on Bloom’s
Taxonomy [36],
and (g) its duration. Then,
each training programme includes a trainee profile and learning pathway section where
the: (a) roles per targeted users, (b) prerequisites, (c) education scope, and (d) mapping
against training schemes (such as ISACA (https://www.isaca.org/ (accessed on 20 April
2021)), SANS (https://www.sans.org/ (accessed on 20 April 2021)), CompTIA (https:
//www.comptia.org/home (accessed on 20 April 2021)), (ISC)
2
(https://www.isc2.org/
(accessed on 20 April 2021))) are identified. Lastly, a training programme can be assigned
to one or more organisations.
4.2. Training Programme Content
Training programme content is part of one training programme and includes one or
more types of educational material and zero or one training scenario. The basic information
of a piece of content allows the user to understand its scope such as, the content’s (a) name,
(b) offering level (based on CISCO’s certification schemes), ranging from easy to hard
difficulty levels, also known as foundation, practitioner, intermediate, and expert), and (c)
duration. Both (b) and (c) are subsets of the corresponding training programme’s fields.
For instance, a training programme of the “intermediate” offering level cannot include
contents of the “expert” offering level.
4.3. Educational Material
Educational material is a subset of guidelines and brochures, etc., which allows the
trainee to better understand the substance of the training programme content. It has the
following attributes: (a) a name, (b) a difficulty level (also based on CISCO certification
schemes), and (c) a URL that points to the online reference of the educational material.
Lastly, educational material can have an online evaluation report (i.e., questionnaire with
closed-ended questions) that will be used to automatically evaluate the trainee.
4.4. Training Scenario
A training scenario is made up of zero or one core cyber system asset model (i.e., the
model that contains the different assets of an organisation as well as their relations) and
one or more CTTP models, and it is used to set up the virtual environment that will be
used for a specific training programme.
4.5. CTTP Models
CTTP models will determine: (a) the cyber system components and cyber threats
covered by a CTTP programme, (b) the ways of simulating components of a cyber-system
and the cyber-attacks against it, (c) the components of the system that may be emulated
and the ways of emulating them, and (d) the real system operational events that should
be monitored and analysed to assess the operational security status of a cyber-system in
real-time. The full specification of the CTTP Models is available in [
1
]. The next subsections
include updates that occurred after writing the above-mentioned paper.
Appl. Sci. 2021,11, 5165 9 of 28
4.5.1. Emulation Model
An emulation model includes information for the automated generation and inter-
connection of emulated cyber system components and is intended to be dynamically
parsed by an emulation tool (e.g., virtual infrastructure management solutions based
on OpenStack (https://www.openstack.org/ (accessed on 23 April 2021)) or Kubernetes
(https://kubernetes.io/ (accessed on 23 April 2021)). The updates that occurred to the
emulation model included the specification of two new attributes, namely (a) actual trace,
an attribute that allows an emulation tool to know the structure of an action that the
trainee is expected to perform, and (b) a Boolean value called linkAvailable that allows
an emulation tool to understand whether a deployed VM should be visible to the trainee
or not.
4.5.2. Simulation Model
A simulation model includes information for the simulation of different layers in
the cyber systems implementation stack and is intended to be dynamically parsed by
simulation components (e.g., NS-3 https://www.nsnam.org/ (accessed on 23 April 2021)).
Unlike the emulation sub-model, the simulation one underwent a number of structural
updates. More specifically, the updated simulation model structure is as follows:
rootComponent
Na m e : S t ri n g
Ty p e : En u m ( St ri ng , I nt e ge r , Do ubl e , B ool ea n , I ns t an t )
Att r ib u tes
Na m e : S t ri n g
Va l ue : S t ri ng
Ty p e : En u m ( St ri ng , I nt e ge r , Do ubl e , B ool ea n , I ns t an t )
That being said, a simulation model has the following attributes: (a) a name, (b) the
involved tool’s name, (c) a template (optional), (d) the simulation duration (in minutes),
(e) the execution speed, (f) a random seed, (g) the initial simulation time, and (h) the
deployment mode. Moreover, from a structural perspective, a simulation model consists
of a root component (with a unique name and type), which, in turn, consists of some
sub-components or attributes.
4.5.3. Serious Game
A serious game model includes information about the following two types of games:
PROTECT [
37
] or Awareness Quiz [
38
]. Updates occurred only on the creation of the latter.
An Awareness Quiz Serious Game model includes the following attributes: (a) the quiz
mode, (b) the available lives, (c) the question time, (d) the points added to the score, (e) the
points removed from the score, and (f) specific attributes corresponding to the respective
quiz mode. If a game shall be played with a predefined quiz (predefined quiz mode), a
specific attribute represents the unique identifier of the quiz. If the set of questions for
a quiz shall be compiled on the fly for a certain thematic context (context quiz mode),
the following specific attributes are included: (a) the number of questions that shall be
asked, (b) a minimum difficulty for the considered questions, (c) a maximum difficulty for
the considered questions, (d) one or more quiz topics, on the basis of which the thematic
selection of relevant questions takes place. A quiz topic is represented by metadata values
of a corresponding metadata type.
Appl. Sci. 2021,11, 5165 10 of 28
4.5.4. Data Fabrication
A data fabrication model includes information that will be used for the creation of
synthetic events and is intended to be provided to data fabrication tools, e.g., the IBM Data
Fabrication Platform developed by IBM Israel [
39
]. The data fabrication model did not
undergo any substantial updates. Its core component is the scenario, which consists of
one or more actions/activities, one or more constraints, one or more sub-nets, one or more
connections, and one or more applications.
4.5.5. Training Delivery Parameter Model
The training delivery parameter (TDPM) model (previously mentioned as the training
programme) is the “orchestrator” of the above-mentioned models.
Content-wise, the updated TDPM consists of the following attributes: (a) a name, (b) a
programme type (e.g., single user, red/blue team, etc.), (c) a difficulty (scaling from 1 to 20),
(d) a bonus (added to the trainee’s final score if he/she successfully finalised the training
earlier than expected), (e) a penalty (subtracted from the trainee’s final score if he/she
failed to finalise the programme within the time), (f) the targeted scenario actor(s), (g) a
flag value called “follow sequence” that allows the training tool to identify whether the
TDPM’s executions need to follow a specific order, (h) the linked vulnerabilities (based on
CVE’s) and weaknesses (based on CWE’s), (i) the prerequisites, (j) the mitigation controls,
(k) the background legal context, and (l) the involved assets.
It also contains the scenario’s storyline and course of actions as well as the dura-
tion. Moreover, it contains the training standards it was based on (e.g., CSA (https:
//cloudsecurityalliance.org/ (accessed on 20 April 2021)), ISO (https://www.iso.org/
home.html (accessed on 20 April 2021)), NIST (https://www.nist.gov/ (accessed on
20 April 2021)), etc.), the action types (based on several frameworks such as MITRE
ATT&CK (https://attack.mitre.org/ (accessed on 20 April 2021)), the Cyber Kill Chain
(https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html (ac-
cessed on 20 April 2021)), and NIST’s Incident Response [
40
]), and the targeted roles (based
on the NIST NICE (https://www.nist.gov/itl/applied-cybersecurity/nice (accessed on
20 April 2021)) and e-CF Framework (https://www.ecompetences.eu/ (accessed on 20
April 2021))).
Lastly, from a structural point of view, a TDPM includes one or more pieces of
execution information. Each piece of execution information can include one or more
screens (that will be presented to the trainee). A screen includes the tool that will be
presented to the trainee, whether it will be visible (or not), the targeted role (for instance, if
a red/blue team TDPM is created, one screen can be presented to the blue team members
whereas another to the red/blue team ones), a brief description of a screen, a hint and its
impact (if enabled), the max allowed time a trainee could spend on this screen and a flag
value that terminates the whole training session, if the trainee fails to successfully finalise
the content of the screen within the requested time limit. Lastly, a screen includes one or
more expected traces.
An expected trace can be: (a) an evaluation report that the trainee is asked to fill after
he/she finalises the tasks presented to the screen, (b) an event captor, which allows the
training tool to understand if the expected actions were a result of the trainee, and (c) a
serious game report.
5. Cyber Threat and Training Models and Programmes Adaptation Tool
The CTTP models and programmes adaptation tool covers primary forms of analysis
of the impact that specific changes in some parts of the programme have on other parts
and checks about the completeness (coverage) and consistency of the entire specification
of CTTP models and programmes when some parts of the change. CTTP programme
adaptation may be along: (a) the scope of the attacks that they cover (e.g., component
specific attacks, system-wide attacks); (b) the sophistication of the attacks (e.g., attacks
that explicitly or implicitly affect the asset that they compromise); and (c) the type of
Appl. Sci. 2021,11, 5165 11 of 28
response expected from the trainee (e.g., preparedness, analysis, immediate incident re-
sponse, post-incident response). The general principle underpinning the adaptation of
CTTP programmes will be to vary the degree of difficulty that the programme presents to
the trainee (e.g., going from component specific to system wide attacks, from asset explicit
to asset implicit compromising attacks, from preparedness to analysis). Such levels and
corresponding adaptations will depend on the type of system, attack, asset, and security
property and will be specified explicitly in the CTTP programme. CTTP programme adap-
tation is being driven by trainee performance (e.g., increasing/maintaining/reducing the
difficulty of a programme if trainees meet/fail (marginally)/fail current action expecta-
tions). Furthermore, CTTP programmes will be improved based on a continuous process
involving including: (a) automatically recorded performance measures regarding the un-
dertaking of the CTTP programme (e.g., programme completion time) and (b) assessing
the level of compliance of these actions to expectations set by the cyber system asset model.
The CTTP model and programmes adaptation tool is offered as a web application.
In general, the CTTP models and programmes adaptation is separated into three
phases. The first phase, namely, pre-evaluation, includes the training programme that
was solely based on a cyber system asset model. Thus, they are based on a theoretical
background (asset model) where there was no interaction with an actual cyber system.
The second phase, namely, pre-adaptation, includes creating new training programmes
based on the security assessments conducted in a cyber systems through Sphynx’s Secu-
rity Assurance Platform (SAP) (https://www.sphynx.ch/products/#assurance-platform
(accessed on 18 April 2021)) or the updates of existing ones. Lastly, the third and final
phase, namely, post adaptation, includes the adaptation of the phase two programmes
based on changes in the asset model (e.g., insertion of a new asset or security control),
the introduction of new vulnerabilities as well as changes on an existing vulnerability’s
likelihood (i.e., a likelihood’s shift from LOW to HIGH) and finally, the adaptation based
on a trainee’s performance.
5.1. Adaptation Based on Sphynx’s Security Assurance Platform
As above-mentioned, a CTTP models and programmes adaptation will be based on the
utilisation of Sphynx’s Security Assurance Platform. Four prominent cases that are based on
the outcomes of the platform and trigger adaptation actions were identified, (a) when a new
security control is inserted to the system, i.e., “a safeguard or countermeasure prescribed for
an information system or an organisation designed to protect the confidentiality, integrity,
and availability of its information and to meet a set of defined security requirements”, (b)
when a vulnerability is detected on an asset that was not vulnerable before (based on SAP’s
Vulnerability Loader Component), (c) when a new vulnerability is detected on an existing
asset, and (d) when the likelihood of a vulnerability changes from low to high, making it a
higher priority training target.
5.1.1. Adaptation Based on Security Controls
An adaptation is triggered when a new security control asset is detected (see
Algorithm 1). The condition for this adaptation is checked every time a new asset is
inserted (by using SAP’s Asset Loader). If the condition is true, the adaptation tool searches
for existing training delivery parameters models that involve the said security control
to identify if training programmes that take into consideration if such controls exist. If
such models are found, it generates an alert to notify the trainer of their existence. The
generated notification also includes information for the training programme content that is
assigned (if any), so that it can be assigned to a trainee (via the training tool). Otherwise,
the adaptation tool first creates the training delivery parameter model and then creates an
alert prompting the trainer to assign to a training programme content. If the condition is
false, no adaptation actions are produced.
Appl. Sci. 2021,11, 5165 12 of 28
Algorithm 1: Adaptation based on security controls
Input : asset
Output: Produce an alert notifying the trainer for the adaptation action
begin
Fetch all from assurance_db based on $tdpm_involved_assets.asset_id, asset.asset_id, security_control_type.id into tdpm;
if tdpm is Truethen
#Alert Trainer;
Alert("The Training Delivery Parameter Models, [tdpm_list], is/arealready linked with $asset.sec_control_name");
else
Create a new TrainingDelivery Parameter Model to include the identified $asset.sec_control_name;
end
end
5.1.2. Adaptation Based on Vulnerable Assets
New Vulnerabilities on Existing Assets
This adaptation action is triggered when a result of the dynamic testing or the vulner-
ability assessment module detects vulnerabilities on an asset that was not affected before
(see Algorithm 2). This adaptation’s condition is checked by the adaptation tool every
time a new result is generated. If the condition is true, the adaptation tool searches for
training delivery parameters models that involve the said asset. If such models are found,
it generates an alert to notify the trainer of their existence. The generated notification also
includes information for the training programme content that is assigned (if any), so that
it can be assigned to a trainee (via the training tool). Otherwise, the adaptation tool first
creates the training delivery parameter model and then creates an alert prompting the
trainer to assign to a training programme content. If the condition is false, no adaptation
actions are produced.
Algorithm 2: Adaptation based on existing asset vulnerabilities
Input : Assessment Result (ar)
Output: Produce an alert notifying the trainer for the adaptation action
begin
if ar.model is equal to ’Dynamic_Testing_Assessment model OR ’Vulnerability_Assessment then
fetch all from assurance_db based on ar.id into dtr;
fetch all from assurance_db based on dtr.cve into r;
#If the response is true then the assessed asset has vulnerabilities;
if r is Truethen
fetch all from assurance_db based on dtr.cve, tdpm_involved_cves into tdpm;
if tdpm is Truethen
#Alert Trainer;
Alert("The Training Delivery Parameter Models, [tdpm_list], is/arealready linked with $dtr.cve");
else
if dtr.cwe is not Empty then
Create Trainingdelivery parameter model to train the user on identifying, mitigating and preventing vulnerability with id
$dtr.cve and weakness with id $dtr.cwe;
else
Create Trainingdelivery parameter model to train the user on identifying, mitigating and preventing vulnerability with id
$dtr.cve;
end
end
else
#No vulnerabilities were identified;
exit();
end
else
#Assessment out-of-scope;
exit();
end
end
New Vulnerable Asset
This adaptation action is triggered when a new asset is inserted (through the cyber
system’s asset model) in the assurance tool’s database and the dynamic testing or vulner-
abilities assessment component identifies vulnerabilities on it (see Algorithm 3). If the
condition is true, the adaptation tool searches for training delivery parameters models
that involve the said asset. If such models are found, an alert is generated to notify the
trainer of their existence and includes information for the training programme content that
is assigned (if any), so that it can be assigned to a trainee. Otherwise, the adaptation tool
first creates the training delivery parameter model and then creates an alert prompting the
trainer to assign to a training programme content. If the condition is false, no adaptation
actions are produced.
Appl. Sci. 2021,11, 5165 13 of 28
Algorithm 3: Adaptation based on a newly inserted vulnerable asset
Input : Assessment Result (ar)
Output: Produce an alert notifying the trainer for the adaptation action
begin
if ar.model is equal to ’Dynamic_Testing_Assessment’ OR ’Vulnerability_Assessment’ model then
fetch all from assurance_db based on ar.id into dtr;
fetch all from assurance_db based on dtr.cve into r;
if r is Truethen
#In this case we search if we have any TDPM that involves this asset;
fetch all from assurance_db based on dtr.cve, tdpm_involved_cves into tdpm;
if tdpm is Truethen
#Alert Trainer;
Alert("The Training Delivery Parameter Models, [tdpm_list], is/arealready linked with $ dtr.cve");
else
if dtr.cwe is not Empty then
Create Trainingdelivery parameter model to train the user on identifying, mitigating and preventing vulnerability with id $
dtr.cve and weakness with id $ dtr.cwe;
else
Create Trainingdelivery parameter model to train the user on identifying, mitigating and preventing vulnerability with id $
dtr.cve;
end
end
else
# No identified vulnerabilities;
exit();
end
else
# Assessment out-of-scope;
exit();
end
end
Increased Likelihood of an Existing Vulnerability
This adaptation action is triggered when a result from the dynamic testing or the
vulnerability assessment indicates that a previously discovered vulnerability has changed
its likelihood level from low to high (see Algorithm 4). If the action is true, the adaptation
tool searches for training delivery parameter models that are linked to the said vulnerability.
If such models are found, it generates an alert to notify the trainer of their existence. The
generated alert also includes information for the training programme content that is
assigned (if any), so that it can be assigned to a trainee. Otherwise, the adaptation tool
first creates the training delivery parameter model and then creates an alert prompting the
trainer to assign to a training programme content. If the condition is false, no adaptation
actions are produced.
Algorithm 4: Adaptation based on a likelihood alteration
Input : Assessment Result (ar)
Output: Produce an alert notifying the trainer for the adaptation action
begin
if ar.model is equal to ’Dynamic_Testing_Assessment model OR ’Vulnerability_Assessment then
fetch all from assurance_db based on ar.id into dtr;
fetch all from assurance_db based on dtr.cve into r;
fetch one ar.likelihoodLevel from assurance_db based on last_dtr.ar_id into oldLikelihoodLevel;
if $oldLikelihoodLevel is LOW then
fetch all from assurance_db based on dtr.cve, tdpm_involved_cves into tdpm;
if tdpm is Truethen
#Alert Trainer;
Alert("The Training Delivery Parameter Models, [tdpm_list], is/arealready linked with $dtr.cve");
else
if dtr.cwe is not Empty then
Create Trainingdelivery parameter model to train the user on identifying, mitigating and preventing vulnerability with id
$dtr.cve and weakness with id $dtr.cwe;
else
Create Trainingdelivery parameter model to train the user on identifying, mitigating and preventing vulnerability with id
$dtr.cve;
end
end
else
#Vulnerability’s likelihood LEVEL was not LOW;
exit();
end
else
#Assessment out-of-scope;
exit();
end
end
5.1.3. Adaptation Based on Trainee’s Performance
The adaptation based on the trainee’s performance is triggered when a trainee com-
pletes an evaluation report or finalises a training programme’s content. By doing that, a
message is being generated and published to a message broker’s predefined channel that
the adaptation tool is listening to in order to initiate the adaptation phase. The message
Appl. Sci. 2021,11, 5165 14 of 28
includes information for the completed component (evaluation report or content), the
trainee’s expertise, the completion time, and the final score (normalised in 100).
Completion of an Educational Material’s Evaluation Report
Upon the completion of an evaluation report (of an existing educational material), the
adaptation tool consumes the correspondent message and initiates the adaptation phase.
More specifically, the adaptation tool checks the evaluation report’s difficulty (available
in the assurance tool’s database) and the trainee’s expertise (provided in the consumed
message) and, based on the algorithm presented in Algorithm 5, it produces an adaptation
alert. In general, the adaptation tool can either be used as an alert mechanism where it
will notify the trainer of the need to create a new evaluation report or assign an existing
evaluation report with different difficulty.
Algorithm 5: Adaptation based on the evaluation report’s score
Input : Trainee’s performance (m), Evaluation Report Difficulty (e)
Output: Adaptation alert notifying the trainer for the adaptation action
begin
traineeExpertise = m.getTraineExpertise();
if traineeExpertise is greater than e then
if m.score is greater than or equal to 90 then
if traineeExpertise less than ’Expert’ then
#Generate a random number from 3 to 20;
int random = generateRandonNumber();
#Create a set of questions more difficult than the evaluation report’s difficulty;
List<QuestionPool> questions=getQuestionsFromQuestionPool(random,e.difficulty+1);
#Create new evaluation report;
createNewEvaluation Report (questions);
#Alert Trainer for the creationof the report;
alert();
else
#Alert Trainer that the examined evaluation reportis already of an ’Expert’ level;
alert();
else if m.score is greater than or equal to 50 AND m.score less than 90 then
#Alert Trainer that no further actions areneeded. Trainee’s score is within the appropriate scoring range [50,80).;
alert();
else
#Alert Trainer that the trainee needs to be evaluated for his/her performance.;
alert();
else if traineeExpertise is equal to e then
if m.score is greater than or equal to 80 then
if traineeExpertise less than ’Expert’ then
#Generate a random number from 3 to 20;
int random = generateRandonNumber();
#Create a set of questions more difficult than the evaluation report’s difficulty;
List<QuestionPool> questions=getQuestionsFromQuestionPool(random,e.difficulty+1);
#Create new evaluation report;
createNewEvaluation Report (questions);
#Alert Trainer for the creationof the report;
alert();
else
#Alert Trainer that the examined evaluation reportis already of an ’Expert’ level;
alert();
else if m.score is greater than or equal to 50 AND m.score less than 80 then
#Alert Trainer that no further actions areneeded. Trainee’s score is within the appropriate scoring range [50,80).;
alert();
else
if traineeExpertise not equal to ’Foundation’ then
#Generate a random number from 3 to 20;
int random = generateRandonNumber();
#Create a set of questions easier than the trainee’s expertise;
List<QuestionPool> questions = getQuestionsFromQuestionPool(random,e.difficulty-1);
#Create new evaluation report;
createNewEvaluationReport (questions);
#Alert Trainer for the creationof the report;
alert();
else
#Alert Trainer that the examined evaluation reportis of an ’Foundation’ level;
alert();
else
if m.score is greater than or equal to 80 then
if traineeExpertise is equal to ’Expert’ then
#Generate a random number from 3 to 20;
int random = generateRandonNumber();
#Create a set of questions more difficult than the evaluation report’s difficulty;
List<QuestionPool> questions=getQuestionsFromQuestionPool(random,e.difficulty+1);
#Create new evaluation report;
createNewEvaluation Report (questions);
#Alert Trainer for the creationof the report;
alert();
else
#Alert Trainer that the examined evaluation reportis already of an ’Expert’ level;
alert();
else
#Alert Trainer that no further actions areneeded. Trainee’s score is within the appropriate scoring range [50,80).;
alert();
Appl. Sci. 2021,11, 5165 15 of 28
Completion of a Training Programme Content
Upon the completion of a training programme content, the adaptation tool consumes
the correspondent message and initiates the adaptation phase. In general, a training pro-
gramme content’s session can last for a predefined amount of time and is of particular
difficulty. That being said, the adaptation tool checks the completion time, success score,
and trainees’ expertise as received from the consumed message and the content’s diffi-
culty as stored in the assurance tool’s database, and based on the algorithm presented in
Algorithm 6
it produces the adaptation results. As before, the adaptation tool can either
be used as an alert mechanism where it will notify the trainer of the need to create a new
evaluation report or assign an existing evaluation report with different difficulty.
5.2. Demonstrator
5.2.1. Adaptation Based on Security Controls and New Threats
This subsection provides a demonstration of the “existing asset vulnerability” (see
Algorithm 5) adaptation procedures. For the former (see Figure 4), the initial step was
to execute a dynamic testing assessment based on a cyber system asset model deployed
in the cyber range platform. The assessment results (produced by the execution of the
dynamic testing assessment), indicated that several new vulnerabilities were identified
for the Apache Tomcat. Based on these results, the adaptation tool checked if a training
delivery parameter model with the newly identified vulnerabilities exist. As it did not find
one, it proceeded with the automatic creation of a new training delivery parameter model
adaptation and pre-populated with a number of parameters such as the involved assets,
the CVE and CWE (based on the adaptation scenario) and a few additional parameters
including the model’s storyline, the difficulty, the duration, and the scenario actors.
Figure 4. Existing asset vulnerability demonstration.
5.2.2. Adaptation Based on Trainee’s Performance
Next, the CTTP models and programmes adaptation tool received a notification
that a trainee of “practitioner” expertise finalised the existing “password management”
educational material’s evaluation report (of “practitioner” offering level). The trainee’s
final score (45) was below the expected score range (greater than or equal to 50). Given that
both the trainee and the evaluation report was of “practitioner” level, the CTTP models and
programmes adaptation tool automatically created a new evaluation report of “foundation”
level, assigned to a new educational material and notified the trainer of the need to re-assess
the trainee based on the newly created educational material (see Figure 5).
Appl. Sci. 2021,11, 5165 16 of 28
Algorithm 6: Adaptation based on the completion time and score of a Training
Input : Trainee’s performance (m), Evaluation Report Difficulty (e)
Output: Adaptation alert notifying the trainer for the adaptation action
begin
trainingProgrammeContent = findTrainingProgrammeContentById(m.getId());
contentName = trainingProgrammeContent.getName();
adaptationTotalTime= m.getTotalTime();
trainingProgrammeTime = training ProgrammeContent.getTime();
contentDifficulty = training ProgrammeContent.getDifficulty();
traineeScore = m.getScore();
traineeExpertise = m.getTraineeExpertise();
tpcOfferingLevel = trainingProgrammeContent.getOfferingLevelType().getValue();
if traineeScore is greater than or equal to 50 then
if adaptationTotalTime is less than or equal to trainingProgrammeTime OR adaptationTotalTime is less than or equal to (trainingProgrammeTime + 10) then
#Alert Trainer that the Training Programme Content time is within the requested time range;
alert();
end
else if adaptationTotalTime is less than or equal to (trainingProgrammeTime+10) then
if traineeExpertise is equal to ’Foundation’ then
if contentDifficulty is equal to ’Foundation’ then
if traineeScore is less than 60 then
#Alert Trainer that the Trainee’s score is not within the requested range (less than 60) thus a performance evaluation will be needed;
alert();
else
Create TrainingProgramme Content of ’Foundation’ difficulty and assign it to trainee;
end
end
else
#Alert Trainer to assign an existing Training Programme Content of ’Foundation’ difficulty to trainee;
alert();
end
end
else if traineeExpertise is equal to ’Practitioner’ then
if contentDifficulty is equal to ’Foundation’ then
if traineeScore is less than 60 then
#Alert Trainer that the Trainee’s score is not within the requested range (less than 60) thus a performance evaluation will be needed;
alert();
else
Create TrainingProgramme Content of ’Foundation’ difficulty and assign it to trainee;
end
end
else if contentDifficulty is equal to ’Pracititioner’ then
#Alert Trainer to assign an existing Training Programme Content of ’Foundation’ difficulty to trainee and re-evaluate him/her;
alert();
end
else
#Alert Trainer to assign an existing Training Programme Content of ’Practitioner’ difficulty to trainee and re-evaluate him/her;
alert();
end
end
else if traineeExpertise is equal to ’Intermediate’ then
if contentDifficulty is equal to ’Foundation’ then
#Alert Trainer that the Trainee’s score is not within the requested range (less than 60) thus a performance evaluation will be needed;
alert();
end
else if contentDifficulty is equal to ’Pracititioner’ then
if traineeScore is less than 60 then
#Alert Trainer that the Trainee’s score is not within the requested range (less than 60) thus a performance evaluation will be needed;
alert();
else
#Alert Trainer to assign an existing Training Programme Content of ’Practitioner’ difficulty to trainee and re-evaluate him/her;
alert();
end
end
else if contentDifficulty is equal to ’Intermediate’ then
if traineeScore is less than 60 then
Create TrainingProgramme Content of ’Practitioner ’ difficulty and assign it to trainee;
else
#Alert Trainer to assign an existing Training Programme Content of ’Practitioner’ difficulty to trainee and re-evaluate him/her;
alert();
end
end
end
else
if contentDifficulty is equal to ’Foundation’ OR ’Practitioner’ then
#Alert Trainer that the trainee is of ’Expert’ level. He/she should’ve finalise the TrainingProgramme Content within the requested time range, thus he/she will need to be evaluated in
terms of performance.;
alert();
end
else if contentDifficulty is equal to ’Intermediate’ then
if traineeScore is less than 60 then
#Alert Trainer that the Trainee’s score is not within the requested range (less than 60) thus a performance evaluation will be needed;
alert();
else
#Alert Trainer to assign an existing Training Programme Content of ’Practitioner’ difficulty to trainee and re-evaluate him/her;
alert();
end
end
else
if traineeScore is less than 60 then
Create an easier TrainingProgramme Content of ’Expert’ difficulty and assign it to trainee;
else
Ok();
end
end
end
end
else
Ok()
end
end
else
# Alert Trainer that the trainee failed to successfully pass the Training Programme Content. He/she will need to be evaluated in terms of performance;
alert();
end
end
Appl. Sci. 2021,11, 5165 17 of 28
The above-mentioned procedures were also part of the CTTP models and programmes
adaptation tool executed for the smart home use case described in Section 6.
Figure 5. Adaptation based on educational material’s evaluation report score.
6. The IoT-enabled Smart Home Use Case
6.1. Outline
For the evaluation of CYRA, a complete training programme for an operational back-
end ICT system was performed. The organisation that took part in the evaluation offers a
smart energy solution, where energy is collected in smart homes with solar panels, and the
energy distribution is recorded and administrated by the backend system at the company’s
premises [
41
]. This backend system (the cyber system that CYRA was evaluated) is com-
posed of a set of working and backup servers that host the main
organisation’s applications.
At the pre-set phase, the system’s architecture was recorded via short interviews
with the system’s users and operators. Thereupon, the main digital assets were identi-
fied and were uploaded to CYRA through the cyber system asset loader (see
Figure 6
).
Next, an initial vulnerability assessment was executed (through the vulnerabilities loader
component) to understand the basic vulnerabilities that the assessed cyber system has.
In general, the vulnerabilities loader searches for known vulnerabilities of the asset’s up-
loaded through the cyber system asset loader obtained from relevant repositories (i.e.,
NIST’s National Vulnerability Database (NVD) (nvd.nist.gov (accessed on 22 May 2021)).
The Common Vulnerability Scoring System (CVSS) (www.first.org/cvss (accessed on
22 May 2021)) of each identified Common Vulnerabilities and Exposures (CVE) record
(cve.mitre.org (accessed on 22 May 2021)) was then normalised (in CYRA) in the range of
0–100. Next, three dynamic testings (i.e., through the Dynamic Testing Tool) were per-
formed, disclosing automatically the exact technical details of the running system (e.g.,
database version) and further discovering services, applications, and configurations of the
system that the interviewers were not aware of (i.e., a running instance of telnet on one of
the servers). This was the first step of the supported adaptation approaches.
Appl. Sci. 2021,11, 5165 18 of 28
Figure 6. IoT-enabled smart home training scenario.
The results from the above-mentioned sources were then prioritised based on their
severity and impact as low, medium, high (as described in the previous section). In total,
40 assets were defined for the smart energy ecosystem and 100 CVEs were identified.
Next, the threat landscape for the specific sector and organisation was revisited and a
set of the most severe vulnerabilities was concluded. As 10 of the identified vulnerabilities
were of HIGH impact and severity, the training was concentrated on them (see this list in
Figure 7).
Figure 7. Security assessments.
To monitor for potential exploitation of these vulnerabilities, event captors were
deployed in the system in order to capture events that could lead to a detection of the
violation of the security property these 10 vulnerabilities might violate as well as monitor
the real-time behaviour of the systems’ users, as such elements are not disclosed by the
aforementioned automated security analysis tools. Generally, the captors continuously
gather events for specific and measurable security aspects, including alerts from the anti-
virus/anti-malware software or the warnings from the web browser, as well as occurrence
frequency of specific operations in the system’s log-files (e.g., how often a user changed its
access credentials). Based on these events, the monitoring tool (part of Sphynx’s Security
Assurance Platform), gathers the information and continuously evaluates individual users
and the overall organisation’s posture. Specific KPIs are defined for the monitored security
properties along with the thresholds that we want to satisfy via training. For example,
the organisation has set a security policy, where for organisation of critical services, the
employees have to change their password every month. An event captor gathers the events
of the relevant application log-files and estimates the password update frequency.
Based on the above-mentioned findings, the learning path of a complete training
programme was defined in order to cover all these security-related KPIs. The training
programme is called “Backend Security Manager” and consists of seven types of training
programme content, as detailed in Table 1.
Following the assignment of the above-mentioned training programme to multi-
ple trainees, their performance was continuously evaluated by the training evaluator
Appl. Sci. 2021,11, 5165 19 of 28
module [20],
while CYRA’s (a) security assurance platform and (b) CTTP models and
programmes adaptation tool, continuously evaluated the trainees’ compliance on the oper-
ational system and the potential effects on the KPIs’ status, as well as provided adaptation
alerts based on the overall trainee’s performance.
Table 1. Backend security manager training programme.
Content CTTP Models Covered Threats/Vulnerabilities and De-
fence Techniques
Introduction to Cy-
ber Security Main lecture and educational material
Introductory knowledge of general security-
related issues and the aspects of confidential-
ity, integrity, availability, authentication, au-
thorisation, non-repudiation, and privacy.
Password manage-
ment
-Main lecture and educational material
-Emulation of a virtual lab for the installation
and utilisation of a password manager (i.e.,
KeePass)
Password management issues, including the
problems from weak or easily guessed ones
and password cracking, as well as aspects
of creating strong passwords, password age-
ing and update policies, and practical and
user-convenient practices for password main-
tenance.
Phishing and social
engineering
-Main lecture and educational material
-Emulation of a virtual lab with an email phish-
ing scenario and the use of OpenPGP software
(Kleopatra)
-Serious game for targeted social engineering
on system administrators with the PROTECT
game [37]
The everlasting effects of social-engineering
with a focus on phishing attacks, as well as
email security authentication, integrity, and
confidentiality.
Malicious software
and patching
-Main lecture and educational material
-Emulation of a virtual lab for malicious soft-
ware analysis and the examination of malware
samples with relevant static binary analysis
tools (e.g., PEView, EDx, TUBS library analy-
sis [42], etc.)
Software flaws, vulnerabilities, and attacks, as
well as relevant protection mechanisms, the
need for regular patching, and analysis tools
of malicious software and attacker’s tactics.
Network monitoring
and security
-Main lecture and educational material
-Emulation of a virtual lab for secure network
configuration and monitoring of networking
traffic with the tool Head(er) Hunter [43]
Networking manipulation and attacks, as well
as secure configuration, administration, and
operation, with a focus on continuous traffic
monitoring and classification.
Digital Forensics
(CTF)
-Main lecture and educational material
-Emulation of a virtual lab for the examina-
tion of a performed attack on the server (i.e.,
data breach, crypto-mining, or ransomware
based on the activated CTTP model) and the
utilisation of forensics software (e.g., glogg,
volatility, Wireshark, Nmap, etc.)
Advance attacker’s tactics and familiarisation
with actual malware and emulated attacks,
including tools and methodologies to conduct
a digital forensics analysis as a first-responder
to security-related incidents.
Attacks on the
backend system
(Red/Blue team
scenario)
-Main lecture and educational material
-Emulation of a virtual lab with a vul-
nerable server that the blue team has
to defend (the populated vulnerabilities
are defined in the selected CTTP model
and are correlated with the defined KPIs)
-The red team can be either performed by the
trainees via a similar emulated setting or can
be completely simulated and triggered auto-
matically or activated manually by the trainer
Acquire advance skills and hands-on experi-
ence as the defender and the attacker of a vul-
nerable system, including tactics and tools to
discover the underlying threats and fix them
or exploit them, respectively. The red team
training involves ethical hacking perspectives
and the main benefit for the trainee is to bet-
ter understand the impacts of attacks on an
insecure or poorly safeguarded system and
learn how to block or mitigate them in the real
working environment.
Appl. Sci. 2021,11, 5165 20 of 28
6.2. Training and Compliance
Based on our first iterations of the overall security monitoring and adaptation of train-
ing for the accomplishment of the designed KPIs, the authors observed similar trainees’
behaviours as in the literature (see Section 2.1). For instance, the fact that a trainee com-
pleted the ”password management” content and successfully covered the learnt material,
does not mean that he/she is going to adopt the working behaviour and update the
password-related habits right away [17,18].
On the other hand, it could take several weeks or even months for the event captors
to capture events regarding password updates that should have been performed by the
trainees for organisation-critical services (as presented on the learnt password policy).
Moreover, some of the trainees never updated their passwords within the monitoring
period [12,18].
Therefore, two elements drastically improved the compliance factor, as well as the
educational aspects [
20
]; the CTTP models and programmes adaptation tool and the so-
called “discussion sessions”. Such a session usually occurs at the beginning and the end of
each training programme and the end of each content (lesson). Within the first session, the
trainer summarises the baseline security assessment results. There, it is made clear to the
trainees that the goal of the programme is not only the training part but the achievement
of a specific improvement for each monitored KPI. The trainees are becoming part of
the organisation’s security culture and are becoming aware that their compliance will be
assessed throughout the process. Thereupon, the training starts and everyone is familiar
with the long-term view. Training evaluation is not the main factor as in a professional
certification exam. Here, the educational and compliance aspects are essential. Thus, after
each content, the trainer analyses its main concepts and discusses with trainees how they
encountered these issues and what problems they faced. At the end of these sessions, any
potential misconceptions and open issues are resolved and everyone is aware of the next
steps that must be taken. The final discussions are performed at the end of the training,
where the current KPIs’ status is assessed and any potential subsequent actions are settled.
As for the CTTP models and programmes adaptation tool, it played an important
role in the overall compliance of the learnt materials as, by continuously adapting the
educational material’s evaluation reports (either by automatically creating new ones or
updating the existing ones) based on the trainee’s performance, helped the trainee to better
understand the content described inside the materials, and then apply what he/she learnt,
to the examined ICT system.
Concluding, by examining the above-mentioned steps and procedures, one can under-
stand that CYRA incorporates a series of technical and procedural mechanisms that not
only helps to train a user but also examines whether the learnt material was applied to an
operational cyber system. As for the presented use case, the authors reached the defined
KPIs thresholds and the desired compliance level within the monitoring period. Moreover,
all 10 severe CVEs were successfully resolved. This period included two weeks for the
baseline analysis, four weeks for training (3 h of training per week for each trainee), and
two weeks for post-training evaluation and overall feedback.
7. Evaluation Results
7.1. Platform Statistics
CYRA is currently deployed on a virtual machine with its hardware specifications
presented in Table 2. Although not a priority, the authors intend to create a more lightweight
and portable version of the platform before its final release.
Table 2. CYRA’s hardware requirements.
No of. vCPUs RAM Storage (Gb) Bandwidth (Mbps)
8 32 120 50
Appl. Sci. 2021,11, 5165 21 of 28
To provide meaningful statistics of CYRA’s performance, the authors used Kibana
(https://www.elastic.co/kibana (accessed on 26 May 2021)) and Apache JMeter (http:
//jmeter.apache.org/ (accessed on 26 May 2021)). The former was used to continuously
monitor the platform’s performance in terms of resource usage, while the latter was used
to test the performance of the exposed REST APIs.
As depicted in Figure 8, CYRA’s mean CPU usage while the platform is at a normal
use (e.g., creation and retrieval of new CTTP models and training programmes) is only at
3%, whereas its memory usage is equal to 24.9%. When the CTTP Models and Programmes
adaptation tool and Sphynx’s Security Assurance Platform were utilised, one can observe
that the mean CPU usage was increased to 30.5% while the memory usage remained at
the same levels (see Figure 9). In general, CYRA’s CPU and memory usage was observed
to increase to around 70% only when dynamic testing and monitoring assessments were
executed simultaneously.
Figure 8. Mean CPU and memory usage (normal platform usage).
Figure 9. Mean CPU and memory usage (heavy platform usage).
CYRA’s availability (excluding planned downtime) for the monitored period is at
99.99% (see Figure 10) with around four pings per minute (see Figure 11).
Figure 10. CYRA’s availability.
Figure 11. Pings per minute.
Appl. Sci. 2021,11, 5165 22 of 28
As for the user’s interaction with the platform, it is observed that CYRA receives
around 2000 hits every roughly 15 min (see Figure 12).
Figure 12. User ’s interactions with CYRA.
Lastly, JMeter is used to measure the elapsed time per CYRA’s API. JMeter ’s
Glossary [
44
] states that it measures the “load time” as the difference between the time
when the request was sent and the time once a response has been completely received and
the “latency” as the time from just before sending the request to just after the first response
has been received. For the sake of brevity, only two REST API metrics are presented.
The first one is responsible for retrieving all the training programmes, while the latter is
responsible for retrieving all the training scenarios.
As presented in Figure 13, the load time to fetch 547,689 bytes of data for the training
programme’s REST API is 1410 ms.
(a) REST API
(b) Response Time
Figure 13. Training Programme’s REST API (a) and its metrics (b).
Lastly, as for the training scenarios, the load time to fetch 325,846 bytes of data for the
Training Scenario’s REST API is 1222 ms (see Figure 14).
(a) REST API
(b) Response Time
Figure 14. Training Scenarios’ REST API (a) and its metrics (b).
7.2. CTTP Model Editor Evaluation
At the time of writing, 12 external trainers and 20 trainee’s of different sectors (e.g.,
healthcare, maritime, IoT and 5G) and expertise (foundation, practitioner, intermediate,
expert) evaluated the CTTP models and programmes editor (part of the cyber range
assurance platform). Only the trainers were asked to submit an evaluation report, as they
were responsible for presenting the CTTP Models and programmes editor to the trainee’s,
and incorporate their comments into the final report. Most of the users (10 out of 12) have
a technical background, while the rest are general IT personnel (see Figure 15a). Five of the
participants considered themselves of “practitioner” level in terms of their cyber-security
Appl. Sci. 2021,11, 5165 23 of 28
skills, knowledge and abilities, one as “foundation”, four as “intermediate” and two as
“expert” (see Figure 15b).
The four levels of expertise are:
1.
Foundation: The trainer has a basic security knowledge and no experience in creating
cyber range programmes.
2.
Practitioner: The trainer has an advanced security knowledge and limited experience
in creating cyber range programmes.
3.
Intermediate: The trainer is a security expert with limited expertise in creating cyber
range programmes.
4.
Expert: The trainer is a security expert with high expertise in creating cyber
range programmes.
(a) Participant Roles (b) Participant expertise
Figure 15. Participant roles (a) and cyber-security expertise (b).
The participants were asked a total of 14 questions in order to evaluate the usefulness
of the CTTP models, programmes and the editor. As shown in Figure 16, most of the
participants found the CTTP models and programmes editor both easily accessible and
user friendly.
(a) Ease of access (b) User Friendly
Figure 16.
CTTP models and programmes editor’s usage. (
a
) and (
b
) presents the participants
response regarding the Editors’ Ease of access and user-friendliness respectively.
Next, the participants were asked about the virtual tour feature of CTTP models
and programmes editor as well as the editor’s waiting times. The former was created to
facilitate a user on the creation of the CTTP models and programmes. This was deemed
necessary as elsewhere, the user would need to go through several documents to be in
a position to create CTTP models and programmes. As shown in Figure 17a, all of the
participants either agreed (4 out of 12) or strongly agreed (8 out of 12) that this feature
is useful. As for the waiting times, all the participants either agreed or strongly agreed
that the waiting times were acceptable (see Figure 17b). In general, it took an experienced
participant around 8 min to fully define a training programme.
Appl. Sci. 2021,11, 5165 24 of 28
(a) Virtual Tour (b) Waiting Times
Figure 17.
Participants response to the usefulness of the Virtual Tour feature (
a
) and level of accep-
tance for the Editor’s waiting times (b).
Following, the participants were asked about the scope of each CTTP model and the
difficulty of creating a training programme through the CTTP model editor (see
Figure 18
).
For the former, most of the participants (10 out of 12) either agreed or strongly agreed
that the scope of CTTP models is well defined, while 2 out of 12 kept a neutral stance (see
Figure 18a). As for the latter, 11 out of 12 found it either easy or normal to create a training
programme, whereas one participant found it difficult (see Figure 18b).
(a) Scope of CTTP Model (b) Creation of training programme
Figure 18.
Participants response to the CTTP Model’s clear Scope (
a
) and the Training Programme’s
creation difficulty (b).
Succeeding, the participants were asked if the CTTP model and programmes editor
can sufficiently model (a) existing working system’s security aspects (see Figure 19a), (b)
professional training programmes’ educational scope ((see Figure 19b) and (c) the typical
application environment in the participants’ domain (see Figure 19c). The participants
seemed to form a common view for all three questions as they either agreed or strongly
agreed that the CTTP model and programmes editor has sufficient modelling capabilities.
(a) Security Aspects (b) Education Scope (c) Participant’s Domain
Figure 19.
CTTP Models and programmes editors’ modelling capabilities. The subfigures present the responses on whether
the CTTP model and programmes editor can sufficiently model (
a
) existing working system’s security aspects (
a
), (
b
)
professional training programmes’ educational scope (
b
) and (
c
) the typical application environment in the participants’
domain (c).
Lastly, almost all the participants were extremely satisfied with their interaction with
the CTTP models and programmes editor (see Figure 20).
Appl. Sci. 2021,11, 5165 25 of 28
Figure 20. Overall satisfaction score.
8. Conclusions and Future Work
This paper presented our novel model-driven Cyber Range approach by introducing
CYRA, a Cyber Range assurance platform that includes: (a) the CTTP models and pro-
grammes editor, a tool that supports the specification of CTTP models and programmes
that are at the core of the platform’s model-driven cyber range training approach, (b)
Sphynx’s security assurance platform that enables customised and continuous assessment
of the security and privacy of a cyber system and comprehensive risk management and
(c) the CTTP models and programmes adaptation tool, a tool that covers primary forms
of analysis of the impact that specific changes in some parts of the programme have on
other parts and checks about the completeness (coverage) and consistency of the entire
specification of CTTP models and programmes when some parts of it change.
In addition to the above, the manuscript included a validation of CYRA in an opera-
tional backend ICT system of a THREAT-ARREST pilot. The results presented in the use
case shows the organisation increased its security posture by utilising (a) the CTTP models
and programmes editor to create organisation-specific training programmes, (b) Sphynx’s
security assurance platform to enable customised and continuous assessment of the organi-
sation’s backend ICT system and (c) the CTTP models and programmes adaptation tool to
adapt to the newly identified threats.
In general, the overarching objective of these efforts is to create a platform that
would allow an organisation to increase its security posture or maintain it at the highest
possible level by: (a) creating training programmes that would enable its personnel to
understand the continually intensifying threat landscape regardless of the personnel’s
security background, (b) continually assess the security and privacy of the organisation’s
cyber systems and (c) adopt to the threat landscape and trainee’s skills by creating new
training programmes or modifying existing ones.
In terms of the next steps, efforts will focus on (a) extending the CTTP models to
support the specification of models for a wider range of emulation and simulation tools, (b)
extending the CTTP models and programmes adaptation tool to support multiple forms of
adaptation, including the introduction of machine learning algorithms that will allow the
tool to proactively adapt to the ever-increasing threat landscape and (c) defining adaptation
procedures based on user and entity behavioural analytics (UEBA). The authors plan to
provide a number of training programmes in an open repository to which interested parties
can refer and retrieve the programmes of interest.
Finally, the authors aim to assess the usability of CYRA by extending the evaluation
invitations to the whole THREAT-ARREST consortium and its personnel after the final
release of the platform, as well as external parties.
Author Contributions:
Conceptualisation, M.S., I.S., G.S., G.H. and S.I.; methodology, G.S. and S.I.;
software, M.S.; validation, I.S., G.H.; formal analysis, G.S.; investigation, M.S. and G.H.; data curation,
M.S.; writing—original draft preparation, M.S. and G.H.; writing—review and editing, M.S., G.H.,
G.S. and S.I.; visualisation, M.S. and G.H.; supervision, G.S. and S.I.; funding acquisition, G.S. and S.I.
All authors have read and agreed to the published version of the manuscript.
Appl. Sci. 2021,11, 5165 26 of 28
Funding:
This work has received funding from the European Union’s Horizon 2020 research and
innovation programme under grant agreement No. 786890 (THREAT-ARREST).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
Abbreviations
The following abbreviations are used in this manuscript:
CCDCOE Cooperative Cyber Defence Centre of Excellence
CTF Capture The Flag
CTTP Cyber Threat and Training Preparation
CVSS Common Vulnerability Scoring System
CVE Common Vulnerabilities and Exposures
CWE Common Weakness Enumeration
CYRA CYber Range Assurance platform
IoT Internet of Things
KPI Key Performance Indicator
ICT Information and Communications Technology
UEBA User and Entity Behavioural Analytics
VM Virtual Machine
References
1.
Smyrlis, M.; Fysarakis, K.; Spanoudakis, G.; Hatzivasilis, G. Cyber Range Training Programme Specification Through Cyber
Threat and Training Preparation Models. In International Workshop on Model-Driven Simulation and Training Environments for
Cybersecurity; Springer: Guilford, UK, 2020; pp. 22–37.
2.
Somarakis, I.; Smyrlis, M.; Fysarakis, K.; Spanoudakis, G. Model-driven cyber range training: A cyber security assurance
perspective. In Computer Security; Springer: Cham, Switzerland, 2019; pp. 172–184.
3.
Hatzivasilis, G.; Kunc, M. Chasing Botnets: A Real Security Incident Investigation. In 2nd Model-driven Simulation and Training
Environments for Cybersecurity (MSTEC), LNCS; Springer: Guilford, UK; Berlin/Heidelberg, Germany, 2007; Volume 12512,
pp. 111–124.
4.
Soultatos, O.; Papoutsakis, M.; Fysarakis, K.; Hatzivasilis, G.; Michalodimitrakis, M.; Spanoudakis, G.; Ioannidis, S. Pattern-
driven Security, Privacy, Dependability and Interoperability management of IoT environments. In Proceedings of the 24th IEEE
International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2019),
Limassol, Cyprus, 11–13 September 2019; pp. 1–6.
5.
Department for Digital, Culture, Media & Sport Cyber Security Breaches Survey 2021. Available online: https://www.gov.uk/
government/statistics/cyber-security-breaches-survey-2021/cyber-security-breaches-survey- 2021 (accessed on 30 April 2021).
6.
Milkovich, D. 15 Alarming Cyber Security Facts and Stats. Available online: https://www.cybintsolutions.com/cyber-security-
facts-stats/ (accessed on 30 April 2021).
7.
Velada, R.; Caetano, A.; Michel, J.W.; Lyons, B.D.; Kavanagh, M.J. The effects of training design, individual characteristics and
work environment on transfer of training. Int. J. Train. Dev. 2007,11, 282–294. [CrossRef]
8.
Cascio, W.F. Costing Human Resources. In The Financial Impact of Behavior in Organizations, 4th ed.; South-Western Publishing Co.:
Nashville, TN, USA, 2000; pp. 1–322.
9.
Mathis, R.L.; Jackson, J.H. Human Resource Management. In Gaining a Competitive Advantage, 6th ed.; McGraw-Hill Irwin:
Boston, MA, USA, 2006; pp. 1–322.
10.
Peretiatko, R. International Human Resource Management: Managing People in a Multinational Context. Manag. Res. News
2009
,
32, 91–92. [CrossRef]
11.
Manifavas, C.; Fysarakis, K.; Rantos, K.; Hatzivasilis, G. DSAPE—Dynamic Security Awareness Program Evaluation. In
Human Aspects of Information Security, Privacy and Trust (HCI International 2014), LNCS; Springer: Heraklion/Crete, Greece, 2014;
Volume 8533, pp. 258–269.
12.
Abraham, S.; Chengalur-Smith, I. Evaluating the effectiveness of learner controlled information security training. Comput. Secur.
2019,87, 1–12. [CrossRef]
13.
Spanoudakis, G.; Damiani, M. Maña Certifying services in cloud: The case for a hybrid, incremental and multi-layer approach.
In Proceedings of the IEEE 14th International Symposium on High-Assurance Systems Engineering, Omaha, NE, USA, 25–27
October 2012; pp. 17–19.
Appl. Sci. 2021,11, 5165 27 of 28
14.
Burg, D.; Compton, M.; Harries, P.; Hunt, J.; Lobel, M.; Loveland, G.; Nocera, J.; Panson, S.; Waterfall, G. US Cybersecurity:
Progress Stalled-Key Findings from the 2015 US State of Cybercrime Survey. 2015. Available online: https://www.pwc.com/us/
en/increasing-it-effectiveness/publications/assets/2015-us-cybercrime-survey.pdf (accessed on 30 April 2021).
15.
Robinson, A. Using Influence Strategies to Improve Security Awareness Programs. 2021. Available online: https://www.sans.
org/reading-room/whitepapers/awareness/influence-strategies-improve-security-awareness-programs-34385 (accessed on 30
April 2021).
16.
Spitzner, L.; de Beaubien. D.; Ideboen, A; Xu, H.; Zhang, N.; Andrews, H.; Sonaike, A. Cyber Security Breaches Survey 2021.
2019. Available online: https://adcg.org/wp-content/uploads/2020/02/SANS-Security-Awareness-Report-2019.pdf (accessed
on 30 April 2021).
17.
Chouliaras, N.; Kittes, G.; Kantzavelou, I.; Maglaras, L.; Pantziou, G.; Ferrag, M.A. Cyber ranges and testbeds for education,
training, and research. Appl. Sci. 2021,11, 1809. [CrossRef]
18. Chowdhury, N.; Gkioulos, V. Cyber security training for critical infrastructure protection: A literature review. Comput. Sci. Rev.
2021,40, 1–20. [CrossRef]
19.
Gustafsson, T.; Almroth, J. Cyber range automation overview with a case study of CRATE. In 25th Nordic Conference on Secure IT
Systems (NordSec), LNCS; Virtual Event; Springer: Guilford, UK, 2021; Volume 12556, pp. 192–209.
20.
Hatzivasilis, G.; Ioannidis, S.; Smyrlis, M.; Spanoudakis, G.; Frati, F.; Goeke, L.; Hildebrandt, T.; Tsakirakis, G.; Oikonomou, F.;
Leftheriotis, G.; et al. Modern Aspects of Cyber-Security Training and Continuous Adaptation of Programmes to Trainees. Appl.
Sci. 2020,10, 5702. [CrossRef]
21.
Puhakainen, P.; Siponen, M. Improving employees’ compliance through information systems security training: An action research
study. MIS Q. 2010,34, 757–778. [CrossRef]
22.
Baldwin, T.T.; Ford, J.K. Transfer of training: A review and directions for future research. Pers. Psychol.
1988
,41, 63–105. [CrossRef]
23.
Frank, M.; Leitner, M.; Pahi, T. Design considerations for cyber security testbeds: A case study on a cyber security testbed for
education. In Proceedings of the 15th Intl Conf on Pervasive Intelligence and Computing, Orlando, FL, USA, 6–10 November
2017; pp. 38–46.
24.
Leitner, M.; Frank, M.; Hotwagner, W.; Langner, G.; Maurhart, O.; Pahi, T.; Reuter, L.; Skopik, F.; Smith, P.; Warum, M. AIT
Cyber Range: Flexible Cyber Security Environment for Exercises, Training and Research. In Proceedings of the European
Interdisciplinary Cybersecurity Conference (EICC 2020) ACM, Rennes, France, 18 November 2020; pp. 1–6.
25.
Melon, F.; Vaisanen, T.; Pihelgas, M. EVE and ADAM: Situation Awareness Tools for NATO CCDCOE Cyber Exercises. In Systems
Concepts and Integration (SCI) Panel SCI- 300 Specialists’ Meeting on Cyber Physical Security of Defense Systems; NATO: Shalimar, FL,
USA, 2018; pp. 1–15.
26.
Pihelgas, M. Design and implementation of an availability scoring system for cyber defence exercises. In Proceedings of the 14th
International Conference on Cyber Warfare and Security (ICCWS) ACI, Stellenbosch, South Africa, 28 February–1 March 2019;
pp. 329–337.
27.
Joonsoo, K.; Youngjae, M.; Moonsu, J. Becoming invisible hands of national live-fire attack-defense cyber exercise. In Proceedings
of the IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), Stockholm, Sweden, 17–19 June 2019;
pp. 77–84.
28.
Pham, C.; Tang, D.; Chinen, K.; Beuran, R. CyRIS: A cyber range instantiation system for facilitating security training. In
Proceedings of the 7th Symposium on Information and Communication (SoICT) ACM, Ho Chi Minh, Vietnam, 8–9 December
2016; pp. 251–258.
29.
Tang, D.; Pham, C.; Chinen, K.; Beuran, R. Interactive cybersecurity defense training inspired by web-based learning theory. In
Proceedings of the 9th International Conference on Engineering Education (ICEED), Kanazawa, Japan, 9–10 November 2017;
pp. 90–95.
30.
Davis, J.; Magrath, S. A survey of cyber ranges and testbeds. In Defence Science and Technology Organisation (DSTO); Cyber
Electronic Warfare Division (Australia): Edinburgh, South Australia, Australia, 2013; pp. 1–38.
31.
Stoller, M.H.R.R.L.; Duerig, J.; Guruprasad, S.; Stack, T.; Webb, K.; Lepreau, J. Large-scale virtualization in the emulab network
testbed. In USENIX Annual Technical Conference; USENIX: Boston, MA, USA, 2008; pp. 113–128.
32. Anderson, D.S.; Hibler, M.; Stoller, L.; Stack, T.; Lepreau, J. Automatic online validation of network con
guration in the emulab network testbed. In Proceedings of the International Conference on Autonomic Computing, Dublin,
Ireland, 12–16 June 2006; pp. 134–142.
33.
Vykopal, J.; Ošlejšek, R.; ˇ
Celeda, P.; Vizvary, M.; Tovarˇnák, D. KYPO Cyber Range: Design and Use Cases. In 12th International
Conference on Software Technologies (ICSOFT); Springer: Madrid, Spain, 2017; pp. 310–321.
34. Braje, T. Advanced tools for cyber ranges. Linc. Lab. J. 2016,22, 24–32.
35.
ECSO. Understanding Cyber Ranges: From Hype to Reality. 2020. Available online: https://ecs-org.eu/documents/publications/
5fdb291cdf5e7.pdf (accessed on 30 April 2021).
36.
Armstrong, P. Bloom’s Taxonomy. 2016. Available online: https://cft.vanderbilt.edu/guides-sub-pages/blooms-taxonomy/
(accessed on 1 June 2021).
37.
Goeke, L.; Quintanar, A.; Beckers, K.; Pape, S. PROTECT—An easy configurable serious game to train employees against social
engineering attacks. In Computer Security; Springer: Luxembourg City, Luxembourg, 2019; pp. 156–171.
Appl. Sci. 2021,11, 5165 28 of 28
38.
Pape, S.; Goeke, L.; Quintanar, A.; Beckers, K. Conceptualization of a CyberSecurity Awareness Quiz. In International Workshop on
Model-Driven Simulation and Training Environments for Cybersecurity; Springer: Guilford, UK, 2020; pp. 61–76.
39.
D5.1: Real Event Logs Statistical Profiling Module and Synthetic Event Log Generator v1. 2020. Available online:
https://www.threat-arrest.eu/html/PublicDeliverables/D5.1-Real_event_logs_statistical_profiling_module_and_synthetic_
event_log_generator_v1.pdf (accessed on 1 June 2021).
40. Cichonski, P.; Millar, T.; Grance, T.; Scarfone, K. Computer security incident handling guide. NIST Spec. Publ. 2012,800, 1–147.
41.
Smyrlis, M.; Spanoudakis, G.; Fysarakis, K. Teaching Users New IoT Tricks: A Model-driven Cyber Range for IoT Security
Training. IEEE Internet Things (Iot) Mag. 2021, 1–10.
42.
Tsandekidis, M.; Prevelakis, V. Efficient Monitoring of Library Call Invocation. In Proceedings of the 6th International Conference
on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, 22–25 October 2019; pp. 387–392.
43.
Papadogiannaki, E.; Deyannis, D.; Ioannidis, S. Head (er) Hunter: Fast Intrusion Detection using Packet Metadata Signatures.
In Proceedings of the 25th International Workshop on Computer Aided Modeling and Design of Communication Links and
Networks (CAMAD), Virtual Conference, Pisa, Italy, 14–16 September 2020; pp. 1–6.
44.
JMeter, A. Apache JMeter: Glossary. 2021. Available online: https://jmeter.apache.org/usermanual/glossary.html#:~:
text=JMeter%20measures%20the%20latency%20from,be%20longer%20than%20one%20byte (accessed on 26 May 2021).
... This paper will analyze the security issues in a home environment and propose solutions to address them [11][12][13][14]. Since almost everything works or uses the Internet, users have a significant responsibility to educate themselves about the proper and safe use of their smart devices and the associated risks and threats [15][16][17][18]. Modern modeling approaches consider that the IoT technology comprises four layers (application, perception, network, and physical) [19], each of which is susceptible to different types of attacks, and this paper will examine these attacks by layer and provide recommendations for dealing with them. ...
... Then, these solutions can be integrated by the system developers to classify automatically received messages and block malicious attempts before reaching the user. Nevertheless, raising the user's awareness (e.g., training, informative campaigns, etc.) for these threats is one of the main controls that are recommended [16,17]. ...
... Application Social-engineering and phishing Threat modeling [126], ML detection [127,130], user training, and raising awareness [16,17] Installation of malicious software and applications Code and application analysis [131][132][133] Attacks on access control Multi-factor authentication [134], privacy preserving authentication [135] Rootkit attacks Rootkit detection with TEE [136] Failure to install security patches and updates User education [138] Perception Eavesdropping and sniffing attacks Operate within private networks and transmission of fake packets protocol [146] Side-channel attacks Encrypted communication [148] Noise in data AI and neural network anomaly detection [147] Booting attacks Secure booting with encryption and authentication [149] Network DoS WARDOG device notification and mitigation mechanism [162] Man-in-the-middle Multi-factor authentication of device and server [163] Unauthorized access Attribute-based access control with HABACα [164] Routing and forwarding attacks Trust-based computing with SCOTRES [165] Traffic analysis IDS/IPS [166] Physical Loss of power and environmental threats N/A Cloning Quantum key distribution [140] Jamming ML with SVM classifiers [176], trust-based authentication with TRAS [177] ...
Article
Full-text available
As the Internet of Things (IoT) continues to revolutionize the way we interact with our living spaces, the concept of smart homes has become increasingly prevalent. However, along with the convenience and connectivity offered by IoT-enabled devices in smart homes comes a range of security challenges. This paper explores the landscape of smart-home security. In contrast to similar surveys, this study also examines the particularities of popular categories of smart devices, like home assistants, TVs, AR/VR, locks, sensors, etc. It examines various security threats and vulnerabilities inherent in smart-home ecosystems, including unauthorized access, data breaches, and device tampering. Additionally, the paper discusses existing security mechanisms and protocols designed to mitigate these risks, such as encryption, authentication, and intrusion-detection systems. Furthermore, it highlights the importance of user awareness and education in maintaining the security of smart-home environments. Finally, the paper proposes future research directions and recommendations for enhancing smart-home security with IoT, including the development of robust security best practices and standards, improved device authentication methods, and more effective intrusion-detection techniques. By addressing these challenges, the potential of IoT-enabled smart homes to enhance convenience and efficiency while ensuring privacy, security, and cyber-resilience can be realized.
... The sudden need for cyber security in every sector is as the result of the unexpected upsurge of cybercrime. Threat actors are constantly refining their cyber weapons to exploit vulnerabilities, misconfigured IT systems, and emerging technologies [2,3]. A robust cyber security workforce should be an effective defense mechanism [4]. ...
... To bridge this workforce gap and secure our society, an effective training infrastructure element is an environment [5]. Cyber ranges provide cyber virtual environment for security training and testing for security professionals [1,2]. During the Cyber range trainings, hands on exercises are performed to present trainees with a practical hands-on experience [6]. ...
Conference Paper
Abstract—Cyber security is a 21st-century challenge doubled by the risk introduced by the lack of cyber security workforce. To bridge this workforce gap, cyber security learning environment are necessary. The Cyber range is cyber virtual environment for security training for cyber security professionals. This study presents the next-generation tools for developing Cyber ranges in the cloud and integrates automation with Ansible hence, orchestrating the virtual environment for the efficacy of security testsbeds, equipping the user with cyber security readiness to defend against real-life cyber-attacks. The proposed automation methodology can be also incorporated in continuous integration queues, defining the Infrastructure as Code (IaC) DevSecOps strategy. The developed scalable and reusable platform allows malicious cyber activities to be simulated through automation. The exercises and the tools employed gives security professionals a good understanding of adversary’s operations. while the vulnerabilities are mapped to MITRE ATT&CK knowledge base. Our results show that, the developed Cyber range platform is suitable and effective for cyber security training. Notwithstanding, we propose future studies be carried out to look into cyber security problematic in virtual reality (VR) platforms.
... Several cyber range solutions have been developed, including simulation cyber ranges, overlay cyber ranges, emulation cyber ranges, and hybrid cyber ranges [7], [8]. However, IoT contexts differ in various aspects, which affect the training needs of users. ...
... These features can help to improve the development efficiency of the CyberIoT platform. Previous works have demonstrated that the reference 3-layer architecture allows developers to separate out the layers and scale each independently with great modularity [8], [11], [25]. ...
Conference Paper
Full-text available
Digital technologies are changing the way people live and work. Despite the many benefits of digital technologies, they expose users to sophisticated security threats, both in home networks and in enterprise networks. User awareness of security issues surrounding their networks, hardware devices, and software is one of the best practices for mitigating security risks. Cyber range is a promising platform for enabling participants to learn cybersecurity concepts and create awareness on cyber threats through simulated exercises and training. This paper presents CyberIoT, a novel conceptual design of a cyber range platform designed as Platform-as-a-Service that allows users to instantiate, run, and operate cybersecurity training exercises. The platform is designed for implementation using OpenStack. The functional and non-functional requirements are identified. The platform architecture is based on the three-tier Web application architecture, with a Web portal, data store, and various management modules. Further research should include development of training use cases, design validation, and full system implementation.
... Specifically, for cloud implementations, the author of [23] proposes using RESTful services to minimize the complexity by using specific software such as APIs (Advanced Programming Interfaces) for communication between the different layers capable of managing, monitoring, and controlling various segments. In [24], the authors present a model that incorporates emulation, simulation, data fabrication, and serious gaming tools and is composed of three architectural elements: (i) Sphynx's Security Assurance Platform, (ii) CTTP models and program editor, and (iii) CTTP Models and Programmes adaptation tool. ...
Article
Full-text available
In light of the ever-increasing complexity of cyber-physical systems (CPSs) and information technology networking systems (ITNs), cyber ranges (CRs) have emerged as a promising solution by providing theoretical and practical cybersecurity knowledge for participants' skill improvement toward a safe work environment. This research adds to the extant respective literature, exploring the architectural composition of CRs. It aims to improve the understanding of their design and how they are deployed, expanding skill levels in constructing better CRs. Our research follows the PRISMA methodology guidelines for transparency, which includes a search flow of articles based on specific criteria and quality valuation of selected articles. To extract valuable research datasets, we identify keyword co-occurrences that selected articles are concentrated on. In the context of literature evidence, we identify key attributes and trends, providing details of CRs concerning their architectural composition and underlying infrastructure, along with today's challenges and future research directions. A total of 102 research articles' qualitative analyses reveal a lack of adequate architecture examination when CR elements and services interoperate with other CR elements and services participating, leading to gaps that increase the administration burden. We posit that the results of this study can be leveraged as a baseline for future enhancements toward the development of CRs.
... The environment is regularly updated with new scenarios, reflecting the latest trends and threats in cybersecurity. This ensures that training remains relevant and challenging [20]. Figure 1 presents the various stages involved in the cybersecurity training environment that we developed, integrating OpenAI artificial intelligence with the AWS infrastructure. ...
Article
Full-text available
Cybersecurity is a critical concern in today’s digital age, where organizations face an ever-evolving cyber threat landscape. This study explores the potential of leveraging artificial intelligence and Amazon Web Services to improve cybersecurity practices. Combining the capabilities of OpenAI’s GPT-3 and DALL-E models with Amazon Web Services infrastructure aims to improve threat detection, generate high-quality synthetic training data, and optimize resource utilization. This work begins by demonstrating the ability of artificial intelligence to create synthetic cybersecurity data that simulates real-world threats. These data are essential for training threat detection systems and strengthening an organization’s resilience against cyberattacks. While our research shows the promising potential of artificial intelligence and Amazon Web Services in cybersecurity, it is essential to recognize the limitations. Continued research and refinement of AI models are needed to address increasingly sophisticated threats. Additionally, ethical and privacy considerations must be addressed when employing AI in cybersecurity practices. The results support the notion that this collaboration can revolutionize how organizations address cyber challenges, delivering greater efficiency, speed, and accuracy in threat detection and mitigation.
... Recent works [10] describe platforms to train trainees for known and new cyber-attacks by adapting to the continuously evolving threat landscape and examining if the trainees transfer the acquired knowledge to the working environment. In the same way, commercial products like Cyberbit Cyber Range 1 supply a training/simulation platform for the instantiation and management of hyper-realistic training centers, while the AIT Cyber Range, 2 provided by the Austrian Institute of Technology, offers a virtual environment of flexible simulation of critical IT systems. ...
Article
Full-text available
Cyber ranges have gained significant importance in cybersecurity training in recent years, and they are still playing a role of paramount importance, thanks to their ability to give trainees hands-on experience with real-world exercises. This paper presents the motivation and objective of the AERAS project, including a thorough analysis of data from ad hoc interviews and surveys specifically designed and administered for the project’s goals. AERAS aims to apply the cyber range concept to the critical healthcare sector. The AERAS platform will be a virtual cyberwarfare solution that will simulate the operation and effects of security controls and offer hands-on training on their development, assessment, use, and management.
... Next, upon user registration and login in, the platform, the authentication/authorisation policy for a user type is implemented by the above-mentioned security mechanisms. Apart from those built-in controls, the Assurance Platform [33] has been deployed in the H2020 MARVEL project backend. This platform can additionally perform a security/risk analysis for the Corpus components, as well as penetrate testing elements. ...
Article
Full-text available
In terms of the calibre and variety of services offered to end users, smart city management is undergoing a dramatic transformation. The parties involved in delivering pervasive applications can now solve key issues in the big data value chain, including data gathering, analysis, and processing, storage, curation, and real-world data visualisation. This trend is being driven by Industry 4.0, which calls for the servitisation of data and products across all industries, including the field of smart cities, where people, sensors, and technology work closely together. In order to implement reactive services such as situational awareness, video surveillance, and geo-localisation while constantly preserving the safety and privacy of affected persons, the data generated by omnipresent devices needs to be processed fast. This paper proposes a modular architecture to (i) leverage cutting-edge technologies for data acquisition, management, and distribution (such as Apache Kafka and Apache NiFi); (ii) develop a multi-layer engineering solution for revealing valuable and hidden societal knowledge in the context of smart cities processing multi-modal, real-time, and heterogeneous data flows; and (iii) address the key challenges in tasks involving complex data flows and offer general guidelines to solve them. In order to create an effective system for the monitoring and servitisation of smart city assets with a scalable platform that proves its usefulness in numerous smart city use cases with various needs, we deduced some guidelines from an experimental setting performed in collaboration with leading industrial technical departments. Ultimately, when deployed in production, the proposed data platform will contribute toward the goal of revealing valuable and hidden societal knowledge in the context of smart cities.
... Smyrlis, M. researched a model-based scenario authoring technology to improve user adaptability in cyber education. This study enabled the creation of customized training scenarios based on a comprehensive, model-based description of the organization and its security posture [14]. ...
Article
Full-text available
It is essential to build a practical environment of the training/test site for cyber training and weapon system test evaluation. In a military environment, cyber training sites should be continuously developed according to the characteristics of the military. Weapons with cyber security capabilities should be deployed through cyber security certification. Recently, each military has been building its own cyber range that simulates its battlefield environment. However, since the actual battlefield is an integrated operation environment, the cyber range built does not reflect the integrated battlefield environment that is interconnected. This paper proposes a configuration plan and operation function to construct a multi-cyber range reflecting the characteristics of each military to overcome this situation. In order to test the multi-cyber range, which has scenario authoring and operation functions, and can faithfully reflect reality, the impact of DDoS attacks is tested. It is a key to real-world mission-based test evaluation to ensure interoperability between military systems. As a result of the experiment, it was concluded that if a DDoS attack occurs due to the infiltration of malicious code into the military network, it may have a serious impact on securing message interoperability between systems in the military network. Cyber range construction technology is being developed not only in the military, but also in school education and businesses. The proposed technology can also be applied to the construction of cyber ranges in industries where cyber-physical systems are emphasized. In addition, it is a field that is continuously developing with the development of technology, such as being applied as an experimental site for learning machine learning systems.
... At the backend of the system, Assurance Platform is deployed [31], [32], which collects information by the local Metadon agents (aka Particular Agents which have been deployed in the HCII) and perform AI processes, reasoning about the whole healthcare setting for an organization. The Assurance Platform is also utilizing the ELK stack, as well as customized Event Captors, in order to gather data and evidence. ...
Conference Paper
Full-text available
Abstract—Healthcare ecosystems form a critical type of in-frasHealthcare ecosystems form a critical type of in-frastructures that provide valuable services in today societies.However, the underlying sensitive information is also of interest ofmalicious entities around the globe, with the attack volume beingcontinuously increasing. Safeguarding this complex computerizedsetting constitutes a major challenge for the involved organi-zations. This paper presents an incident handling system forhealthcare organizations and their supply-chain. The proposedapproach utilizes swarm intelligence in order to assess the currentsecurity posture in a continuous basis and respond to attacksin real-time. The overall solution is based on the related NIST800.61 standard and implements the operations of i) preparation,ii) detection and analysis, iii) containment, eradication, andrecovery, and iv) post-incident activity. The system is developedunder the EU funded project AI4HEALTHSEC and is appliedin the relevant healthcare pilots.Index Terms—Healthcare sector, incident handling, incidentresponse, response team, security, p (PDF) Incident Handling for Healthcare Organizations and Supply-Chains. Available from: https://www.researchgate.net/publication/365121773_Incident_Handling_for_Healthcare_Organizations_and_Supply-Chains [accessed Mar 10 2023].ructures that provide valuable services in today societies.However, the underlying sensitive information is also of interest ofmalicious entities around the globe, with the attack volume beingcontinuously increasing. Safeguarding this complex computerizedsetting constitutes a major challenge for the involved organi-zations. This paper presents an incident handling system forhealthcare organizations and their supply-chain. The proposedapproach utilizes swarm intelligence in order to assess the currentsecurity posture in a continuous basis and respond to attacksin real-time. The overall solution is based on the related NIST800.61 standard and implements the operations of i) preparation,ii) detection and analysis, iii) containment, eradication, andrecovery, and iv) post-incident activity.
... Over the years, research on the design and development of testbeds for cyberattack simulation has gained traction in the cyberspace community, and a new wave of studies on the topic has begun to develop. Various cyber range solutions have been proposed, such as NCR [4], DETERLab [5], SimSpace [6], EDURange [7], CYRA [8], KYPO [9], and CyRIS [10], to name a few. Some efforts have been made in the development and integration of models and tools, including virtual machines and sandboxes, for the simulation of cyber attacks. ...
Article
Full-text available
Cybercrime has become more pervasive and sophisticated over the years. Cyber ranges have emerged as a solution to keep pace with the rapid evolution of cybersecurity threats and attacks. Cyber ranges have evolved to virtual environments that allow various IT and network infrastructures to be simulated to conduct cybersecurity exercises in a secure, flexible, and scalable manner. With these training environments, organizations or individuals can increase their preparedness and proficiency in cybersecurity-related tasks while helping to maintain a high level of situational awareness. SPIDER is an innovative cyber range as a Service (CRaaS) platform for 5G networks that offer infrastructure emulation, training, and decision support for cybersecurity-related tasks. In this paper, we present the integration in SPIDER of defensive exercises based on the utilization of machine learning models as key components of attack detectors. Two recently appeared network attacks, cryptomining using botnets of compromised devices and vulnerability exploit of the DoH protocol (DNS over HTTP), are used as the support use cases for the proposed exercises in order to exemplify the way in which other attacks and the corresponding ML-based detectors can be integrated into SPIDER defensive exercises. The two attacks were emulated, respectively, to appear in the control and data planes of a 5G network. The exercises use realistic 5G network traffic generated in a new environment based on a fully virtualized 5G network. We provide an in-depth explanation of the integration and deployment of these exercises and a complete walkthrough of them and their results. The machine learning models that act as attack detectors are deployed using container technology and standard interfaces in a new component called Smart Traffic Analyzer (STA). We propose a solution to integrate STAs in a standardized way in SPIDER for the use of trainees in exercises. Finally, this work proposes the application of Generative Adversarial Networks (GANs) to obtain on-demand synthetic flow-based network traffic that can be seamlessly integrated into SPIDER exercises to be used instead of real traffic and attacks.
Chapter
Full-text available
Cyber security research is quintessential to secure computerized systems against cyber threats. Likewise, cyber security training and exercises are instrumental in ensuring that the professionals protecting the systems have the right set of skills to do the job. Cyber ranges provide platforms for testing, experimentation and training, but developing and executing experiments and training sessions are labour intensive and require highly skilled personnel. Several cyber range operators are developing automated tools to speed up the creation of emulated environments and scenarios as well as to increase the number and quality of the executed events. In this paper we investigate automated tools used in cyber ranges and research initiatives designated to augment cyber ranges automation. We also investigate the automation features in CRATE (Cyber Range And Training Environment) operated by the Swedish Defence Research Agency (FOI).
Article
Full-text available
Introduction Today, cyber-security curricula are available across educational types and levels, including a vast array of programs and modules tailored to specific sectors of industry and audiences, to allow more targeted delivery of knowledge. Nonetheless, general agreement on best measures and methods for cybersecurity training has yet to be reached. Objective In this study, we seek to establish the current state-of-the-art in cyber-security training offerings for critical infrastructure protection and the key performance indicators (KPIs) that allow evaluating their effectiveness. Particular focus is given in this study on the aviation, energy and nuclear sectors. Methodology Accordingly, the article presents the findings of a systematic literature review that collected relevant literature produced after 2000. The identified sources have been examined according to a formal data extraction form, allowing the analysis of relevant training solutions, methodologies, target groups and focus areas. Results The results show that solutions that provide hands-on experience, team skills development, high level of real-life fidelity are often preferred to other options, with simulation-based solutions showing the highest amount of research and development. Nonetheless, researchers have not reached agreements on optimal training delivery methods and design of cybersecurity exercises. Conclusion Consequently, research on improving current cybersecurity training offerings should be conducted, to demonstrate whether integrating advantageous attributes from different delivery methods could produce more comprehensive and effective solutions.
Article
Full-text available
In recent years, there has been a growing demand for cybersecurity experts, and, according to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by combining hands-on experience with educational courses, and conducting cybersecurity competitions. In this paper, we conduct a systematic survey of ten Cyber Ranges that were developed in the last decade, with a structured interview. The purpose of the interview is to find details about essential components, and especially the tools used to design, create, implement and operate a Cyber Range platform, and to present the findings.
Conference Paper
Full-text available
Botnets form a special type of malware that nowadays constitute one of the biggest threats in cyber-security. Ordinarily, the hacker exploits existing vulnerabilities to infiltrate the system and install a command-and-control (C&C) infrastructure. Thereupon, the system is "botnized" and performs the bot-master's commands. In most cases, the attacker does not intend to destroy the compromised assets but to utilize them in order to perform other type of attacks , such as crypto-mining or Denial of Service (DoS) campaigns to targeted websites. Nevertheless, ransomware or other disruptive attacks can also be launched at some point and harm the owner of the infected equipment. This paper starts with an overview of botnet cases, attacker's tactics, and relevant defense mechanisms. Then, we present a real step-by-step digital forensics investigation on a customer's bare-metal server in the cloud. The attack was performed in 2020. We describe the storyline from the server's installation, the infection , the investigation, the proper mitigation actions, as well as, the economic implication. Finally, we sum-up which were the main mistakes that enable the attack and propose a silver bulletin for server setup in the cloud.
Conference Paper
Full-text available
In light of the ever-increasing complexity and criticality of applications supported by ICT infrastructures, Cyber Ranges emerge as a promising solution to effectively train people within organisations on cyber-security aspects, thus providing an efficient mechanism to manage the associated risks. Motivated by this, the work presented herein introduces the model-driven approach of the THREAT-ARREST project for Cyber Range training, presenting in detail the Cyber Threat Training and Preparation (CTTP) models. These models, comprising sub-models catering for different aspects of the training, are used for specifying and generating the Training Programmes. As such, the paper also provides details on implementation aspects regarding the use of these models in the context of a usable cyber range training platform and two specific training scenarios.
Article
Full-text available
Nowadays, more-and-more cyber-security training is emerging as an essential process for the lifelong personnel education in organizations, especially for those which operate critical infrastructures. This is due to security breaches on popular services that become publicly known and raise people’s security awareness. Except from large organizations, small-to-medium enterprises and individuals need to keep their knowledge on the related topics up-to-date as a means to protect their business operation or to obtain professional skills. Therefore, the potential target-group may range from simple users, who require basic knowledge on the current threat landscape and how to operate the related defense mechanisms, to security experts, who require hands-on experience in responding to security incidents. This high diversity makes training and certification quite a challenging task. This study combines pedagogical practices and cyber-security modelling in an attempt to support dynamically adaptive training procedures. The training programme is initially tailored to the trainee’s needs, promoting the continuous adaptation to his/her performance afterwards. As the trainee accomplishes the basic evaluation tasks, the assessment starts involving more advanced features that demand a higher level of understanding. The overall method is integrated in a modern cyber-ranges platform, and a pilot training programme for smart shipping employees is presented.
Chapter
Recent approaches to raise security awareness have improved a lot in terms of user-friendliness and user engagement. However, since social engineering attacks on employees are evolving fast, new variants arise very rapidly. To deal with recent changes, our serious game CyberSecurity Awareness Quiz provides a quiz on recent variants to make employees aware of new attacks or attack variants in an entertaining way. While the gameplay of a quiz is more or less generic, the core of our contribution is a concept to create questions and answers based on current affairs and attacks observed in the wild.
Conference Paper
Recent approaches to raise security awareness have improved a lot in terms of user-friendliness and user engagement. However, since social engineering attacks on employees are evolving fast, new variants arise very rapidly. To deal with recent changes, our serious game Cy-berSecurity Awareness Quiz provides a quiz on recent variants to make employees aware of new attacks or attack variants in an entertaining way. While the gameplay of a quiz is more or less generic, the core of our contribution is a concept to create questions and answers based on current affairs and attacks observed in the wild.