Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 480-484.doi: 10.11896/jsjkx.210800048

• Information Security • Previous Articles     Next Articles

Model for the Description of Trainee Behavior for Cyber Security Exercises Assessment

TAO Li-jing, QIU Han, ZHU Jun-hu, LI Hang-tian   

  1. Information Engineering University,Zhengzhou 450001,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:TAO Li-jing,born in 1992,postgra-duate.His main research interests include network security simulation and evalua-tion.
    QIU Han,born in 1981,associate professor.Her main research interests include inter-domain routing system security and network security simulation and evaluation.

Abstract: The evaluation of trainee performance is one of the key points to improve the effectiveness of cyber security exercises,and the study of evaluation method includes two stages:evaluation based on training results and evaluation based on training behavior modeling.The first one cannot figure out the training details,the other can only pre-model some training paths so that it can't determine the correctness of non-preset training path training behavior.In order to solve the problems,a two-layer cyber security exercises trainee behavior description model based on the orientation graph and finite state automatic machine is proposed,and the correctness determination and detail evaluation of non-preset training behavior are realized by combining the characteri-stics of training behavior and training results.An experiment on typical computer network security training scenario shows that,compared with the description model that focuses only on training behavior,the model improves the accuracy of training behavior determination,and realizes the determination of non-preset path training behavior correctness and training details.

Key words: Cyber security exercises, Finite state automatic machine, Oriented graph, Training behavior modeling

CLC Number: 

  • TP393
[1] PATRICIU V V,FURTUNA A C.Guide for designing cyber security exercises[C]//World Scientific and Engineering Academy and Society(WSEAS).2009:172-177.
[2] HENSHEL D S,DECKARD G M,LUFKIN B,et al.Predictingproficiency in cyber defense team exercises[C]//IEEE.IEEE,2016:776-781.
[3] ČELEDA P,ČEGAN J,VYKOPAL J,et al.KYPO-A Platform for Cyber Defence Exercises[J/OL].
[4] CARLISLE M,CHIARAMONTE M,CASWELL D.UsingCTFs for an Undergraduate Cyber Education[C]//2015 USENIX Summit on Gaming,Games,and Gamification in Security Education (3GSE 15).2015.
[5] VYKOPAL J,VIZVARY M,OSLEJSEK R,et al.Lessonslearned from complex hands-on defence exercises in a cyber range[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602.
[6] WEISS R S,LOCASTO M E,MACHE J.A Reflective Ap-proach to Assessing Student Performance in Cybersecurity Exercises[C]//Proceedings of the 47th ACM Technical Symposium on Computing Science Education.2016:597-602.
[7] ANDREOLINI M,COLACINO V G,COLAJANNI M,et al.A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises[J].Mobile Networks & Applications,2020,25(1):236-247.
[8] BRAGHIN C,CIMATO S,DAMIANI E,et al.Towards theMonitoring and Evaluation of Trainees' Activities in Cyber Ranges[C]//Hatzivasilis G.,Ioannidis S.(eds) Model-driven Simulation and Training Environments for Cybersecurity.MSTEC 2020.Lecture Notes in Computer Science,Cham:Springer,2020:79-91.
[9] FANG B X,JIA Y,LI A P,et al.Cyber Ranges:state-of-the-art and research challenges[J].Journal of Cyber Security,2016,1(3):1-9.
[10] WANG Q X,ZHU J H,QIU H.Cybersecurity Lab Tutorial[M].Zhengzhou:Electronic Industry Press,2016.
[1] LIU Xin, WANG Jun, SONG Qiao-feng, LIU Jia-hao. Collaborative Multicast Proactive Caching Scheme Based on AAE [J]. Computer Science, 2022, 49(9): 260-267.
[2] GUO Peng-jun, ZHANG Jing-zhou, YANG Yuan-fan, YANG Shen-xiang. Study on Wireless Communication Network Architecture and Access Control Algorithm in Aircraft [J]. Computer Science, 2022, 49(9): 268-274.
[3] HU An-xiang, YIN Xiao-kang, ZHU Xiao-ya, LIU Sheng-li. Strcmp-like Function Identification Method Based on Data Flow Feature Matching [J]. Computer Science, 2022, 49(9): 326-332.
[4] JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339.
[5] WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354.
[6] WANG Xing-wei, XIN Jun-chang, SHAO An-lin, BI Yuan-guo, YI Xiu-shuang. Study on Development Status and Countermeasures of Industrial Intranet in Enterprises [J]. Computer Science, 2022, 49(7): 1-9.
[7] ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270.
[8] FEI Xing-rui, XIE Yi. Click Streams Recognition for Web Users Based on HMM-NN [J]. Computer Science, 2022, 49(7): 340-349.
[9] ZHAO Dong-mei, WU Ya-xing, ZHANG Hong-bin. Network Security Situation Prediction Based on IPSO-BiLSTM [J]. Computer Science, 2022, 49(7): 357-362.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54.
[12] WEI Hui, CHEN Ze-mao, ZHANG Li-qiang. Anomaly Detection Framework of System Call Trace Based on Sequence and Frequency Patterns [J]. Computer Science, 2022, 49(6): 350-355.
[13] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[14] GAO Wen-long, ZHOU Tian-yang, ZHU Jun-hu, ZHAO Zi-heng. Network Attack Path Discovery Method Based on Bidirectional Ant Colony Algorithm [J]. Computer Science, 2022, 49(6A): 516-522.
[15] PANG Xing-long, ZHU Guo-sheng. Survey of Network Traffic Analysis Based on Semi Supervised Learning [J]. Computer Science, 2022, 49(6A): 544-554.
Full text



No Suggested Reading articles found!