Process-Driven Visual Analysis of Cybersecurity Capture the Flag Exercises
By: Radek Ošlejšek, Radoslav Chudovský, Martin Macak
Potential Business Impact:
Improves cybersecurity training by showing how students learn.
Hands-on training sessions become a standard way to develop and increase knowledge in cybersecurity. As practical cybersecurity exercises are strongly process-oriented with knowledge-intensive processes, process mining techniques and models can help enhance learning analytics tools. The design of our open-source analytical dashboard is backed by guidelines for visualizing multivariate networks complemented with temporal views and clustering. The design aligns with the requirements for post-training analysis of a special subset of cybersecurity exercises -- supervised Capture the Flag games. Usability is demonstrated in a case study using trainees' engagement measurement to reveal potential flaws in training design or organization.
Similar Papers
Process Mining on Distributed Data Sources
Emerging Technologies
Helps track complex systems with many sensors.
Risk Psychology & Cyber-Attack Tactics
Cryptography and Security
Finds how minds make hackers choose attacks.
A Comprehensive Evaluation and Practice of System Penetration Testing
Cryptography and Security
Finds computer weaknesses before bad guys do.