Basit öğe kaydını göster

dc.contributor.authorÇalışkan, Emin
dc.contributor.authorTopgül, M. Oğuzhan
dc.contributor.authorOttis, Rain
dc.date.accessioned10.07.201910:49:13
dc.date.accessioned2019-07-10T20:03:09Z
dc.date.available10.07.201910:49:13
dc.date.available2019-07-10T20:03:09Z
dc.date.issued2017en_US
dc.identifier.citationÇalışkan, E., Topgül, M. O. ve Ottis, R. (2017). Cyber security exercises: A comparison of participant evaluation metrics and scoring systems. NATO Advanced Research Workshop (ARW) on A Framework for a Military Cyber Defence Strategy içinde (180-190. ss.). Norfolk, Virginia, April 11-13, 2016. https://dx.doi.org/10.3233/978-1-61499-771-9-180en_US
dc.identifier.isbn9781614997719
dc.identifier.isbn9781614997702
dc.identifier.issn1874-6268
dc.identifier.issn1879-8292
dc.identifier.urihttps://dx.doi.org/10.3233/978-1-61499-771-9-180
dc.identifier.urihttps://hdl.handle.net/20.500.12511/3815
dc.descriptionNATO Advanced Research Workshop (ARW) on A Framework for a Military Cyber Defence Strategy -- APR 11-13, 2016 -- Norfolk, VAen_US
dc.descriptionWOS: 000451500900015en_US
dc.description.abstractCyber security exercises became an important tool for the information security domain for various reasons. Raising awareness, improving readiness to cyber-attacks, and testing capabilities of experts before a real incident are some. However, measuring the success of exercises and the participants participating in the game is a vague area, which no scientifically elaborated approach has been followed, according to the current literature. In this research, some of the wellknown cyber security exercises are compared and contrasted by evaluation metrics they use and scoring systems they have implemented to their game. Other than capture the flag type events, which collecting points depend on how many challenges participants solve, this paper elaborates on red team vs. blue team exercises. The ultimate goal is to observe strengths and weaknesses of their approach and identify which metrics are commonly used. According to the findings, after a detailed comparison of these exercises, it was realized that current evaluation techniques in cyber security exercises mostly focus on metrics representing the defensive and offensive success of participants. Keeping the systems up and running, successfully defending systems, or attacking other players are some of the key elements. Furthermore, it was realized that exercises provide a useful way to raise awareness, improve technical competence, and enhance the readiness of cyber security experts in the field. Thus, it is important to extract meaningful outcomes from those exercises, such as understanding which participant has enough capacity to deal with eminent cyber security attacks. There are a number of exercises that aim to achieve this goal; however, it is not clearly described how to evaluate the success metrics. Other than that, evaluating players with a solid, reusable, and meaningful approach is still missing. Non-technical, but important, issues like reporting and media relations lack in many of them. It was seen after this research that it should not be just about who comes first in these cyber security exercises; rather, it should tell who is ready for the real combat.en_US
dc.description.sponsorshipNATO, Old Domin Univ, Taras Shevchenko Natl Univ Kyiven_US
dc.language.isoengen_US
dc.publisherIos Pressen_US
dc.relation.ispartofseriesNato Science for Peace and Security Series D-Information and Communication Security
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectCyber Security Exerciseen_US
dc.subjectEvaluation Metricsen_US
dc.subjectCapability Detectionen_US
dc.subjectCapture The Flagen_US
dc.subjectRed Team vs. Blue teamen_US
dc.subjectCTFen_US
dc.titleCyber security exercises: A comparison of participant evaluation metrics and scoring systemsen_US
dc.typeconferenceObjecten_US
dc.relation.ispartofNATO Advanced Research Workshop (ARW) on A Framework for a Military Cyber Defence Strategyen_US
dc.departmentİstanbul Medipol Üniversitesi, Mühendislik ve Doğa Bilimleri Fakültesi, Bilgisayar Mühendisliği Bölümüen_US
dc.identifier.volume48en_US
dc.identifier.startpage180en_US
dc.identifier.endpage190en_US
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.3233/978-1-61499-771-9-180en_US


Bu öğenin dosyaları:

DosyalarBoyutBiçimGöster

Bu öğe ile ilişkili dosya yok.

Bu öğe aşağıdaki koleksiyon(lar)da görünmektedir.

Basit öğe kaydını göster