Score: 0

Process-Driven Visual Analysis of Cybersecurity Capture the Flag Exercises

Published: September 19, 2025 | arXiv ID: 2509.15589v2

By: Radek Ošlejšek, Radoslav Chudovský, Martin Macak

Potential Business Impact:

Improves cybersecurity training by showing how students learn.

Business Areas:
Penetration Testing Information Technology, Privacy and Security

Hands-on training sessions become a standard way to develop and increase knowledge in cybersecurity. As practical cybersecurity exercises are strongly process-oriented with knowledge-intensive processes, process mining techniques and models can help enhance learning analytics tools. The design of our open-source analytical dashboard is backed by guidelines for visualizing multivariate networks complemented with temporal views and clustering. The design aligns with the requirements for post-training analysis of a special subset of cybersecurity exercises -- supervised Capture the Flag games. Usability is demonstrated in a case study using trainees' engagement measurement to reveal potential flaws in training design or organization.

Page Count
42 pages

Category
Computer Science:
Human-Computer Interaction