Home > Research > Publications & Outputs > Towards Customized Cyber Exercises using a Proc...

Links

Text available via DOI:

View graph of relations

Towards Customized Cyber Exercises using a Process-based Lifecycle Model

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Towards Customized Cyber Exercises using a Process-based Lifecycle Model. / Pfaller, Tobias; Skopik, Florian; Smith, Paul et al.
EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference. New York: Association for Computing Machinery (ACM), 2024. p. 37-45.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Pfaller, T, Skopik, F, Smith, P & Leitner, M 2024, Towards Customized Cyber Exercises using a Process-based Lifecycle Model. in EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference. Association for Computing Machinery (ACM), New York, pp. 37-45. https://doi.org/10.1145/3655693.3655713

APA

Pfaller, T., Skopik, F., Smith, P., & Leitner, M. (2024). Towards Customized Cyber Exercises using a Process-based Lifecycle Model. In EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference (pp. 37-45). Association for Computing Machinery (ACM). https://doi.org/10.1145/3655693.3655713

Vancouver

Pfaller T, Skopik F, Smith P, Leitner M. Towards Customized Cyber Exercises using a Process-based Lifecycle Model. In EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference. New York: Association for Computing Machinery (ACM). 2024. p. 37-45 doi: 10.1145/3655693.3655713

Author

Pfaller, Tobias ; Skopik, Florian ; Smith, Paul et al. / Towards Customized Cyber Exercises using a Process-based Lifecycle Model. EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference. New York : Association for Computing Machinery (ACM), 2024. pp. 37-45

Bibtex

@inproceedings{7ea78131c25a4eb19d39d0f6bc69c710,
title = "Towards Customized Cyber Exercises using a Process-based Lifecycle Model",
abstract = "Cyber exercises enable the effective training of cyber security skills in a simulated, yet realistic, environment for a wide variety of professional roles. However, planning, conducting, and evaluating customized (i.e., non-standard) cyber exercise scenarios involves numerous time- and resource-intensive activities, which are still mostly carried out manually today. Unfortunately, the high costs related to these activities limit the practical applicability of cyber exercises to serve widely as a regular tool for skill development. Today, the flow of cyber exercise scenarios usually consists of predefined and meticulously planned injects (e.g. events) that are sequentially rolled out and thus drive the exercise. The composition of such injects resembles a linear process in its simplest form. Therefore, we argue that the utilization of existing, standardized, and well-researched methods from the business process domain provides opportunities to improve the quality of cyber exercises and at the same time reduce the workload necessary for planning and conducting them. This paper reviews the challenges related to conducting customized cyber exercises and introduces a process-based cyber exercise lifecycle model that leverages the power of process modeling languages, process engines, and process mining tools to transform cyber exercises into transparent, dynamic, and highly automated endeavors. We further describe the application of this lifecycle model in course of a proof-of-concept implementation and discuss lessons learned from its utilization at a large-scale national cyber exercise together with CERTs and authorities. While the state of the art mostly focuses on optimizing individual tasks or phases within the cyber exercise lifecycle, our contribution aims to offer a comprehensive integrated framework that spans across the phases, providing interfaces between them, and enhancing the overall effectiveness and maintainability of cyber exercises.",
author = "Tobias Pfaller and Florian Skopik and Paul Smith and Maria Leitner",
year = "2024",
month = jun,
day = "5",
doi = "10.1145/3655693.3655713",
language = "English",
pages = "37--45",
booktitle = "EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference",
publisher = "Association for Computing Machinery (ACM)",
address = "United States",

}

RIS

TY - GEN

T1 - Towards Customized Cyber Exercises using a Process-based Lifecycle Model

AU - Pfaller, Tobias

AU - Skopik, Florian

AU - Smith, Paul

AU - Leitner, Maria

PY - 2024/6/5

Y1 - 2024/6/5

N2 - Cyber exercises enable the effective training of cyber security skills in a simulated, yet realistic, environment for a wide variety of professional roles. However, planning, conducting, and evaluating customized (i.e., non-standard) cyber exercise scenarios involves numerous time- and resource-intensive activities, which are still mostly carried out manually today. Unfortunately, the high costs related to these activities limit the practical applicability of cyber exercises to serve widely as a regular tool for skill development. Today, the flow of cyber exercise scenarios usually consists of predefined and meticulously planned injects (e.g. events) that are sequentially rolled out and thus drive the exercise. The composition of such injects resembles a linear process in its simplest form. Therefore, we argue that the utilization of existing, standardized, and well-researched methods from the business process domain provides opportunities to improve the quality of cyber exercises and at the same time reduce the workload necessary for planning and conducting them. This paper reviews the challenges related to conducting customized cyber exercises and introduces a process-based cyber exercise lifecycle model that leverages the power of process modeling languages, process engines, and process mining tools to transform cyber exercises into transparent, dynamic, and highly automated endeavors. We further describe the application of this lifecycle model in course of a proof-of-concept implementation and discuss lessons learned from its utilization at a large-scale national cyber exercise together with CERTs and authorities. While the state of the art mostly focuses on optimizing individual tasks or phases within the cyber exercise lifecycle, our contribution aims to offer a comprehensive integrated framework that spans across the phases, providing interfaces between them, and enhancing the overall effectiveness and maintainability of cyber exercises.

AB - Cyber exercises enable the effective training of cyber security skills in a simulated, yet realistic, environment for a wide variety of professional roles. However, planning, conducting, and evaluating customized (i.e., non-standard) cyber exercise scenarios involves numerous time- and resource-intensive activities, which are still mostly carried out manually today. Unfortunately, the high costs related to these activities limit the practical applicability of cyber exercises to serve widely as a regular tool for skill development. Today, the flow of cyber exercise scenarios usually consists of predefined and meticulously planned injects (e.g. events) that are sequentially rolled out and thus drive the exercise. The composition of such injects resembles a linear process in its simplest form. Therefore, we argue that the utilization of existing, standardized, and well-researched methods from the business process domain provides opportunities to improve the quality of cyber exercises and at the same time reduce the workload necessary for planning and conducting them. This paper reviews the challenges related to conducting customized cyber exercises and introduces a process-based cyber exercise lifecycle model that leverages the power of process modeling languages, process engines, and process mining tools to transform cyber exercises into transparent, dynamic, and highly automated endeavors. We further describe the application of this lifecycle model in course of a proof-of-concept implementation and discuss lessons learned from its utilization at a large-scale national cyber exercise together with CERTs and authorities. While the state of the art mostly focuses on optimizing individual tasks or phases within the cyber exercise lifecycle, our contribution aims to offer a comprehensive integrated framework that spans across the phases, providing interfaces between them, and enhancing the overall effectiveness and maintainability of cyber exercises.

U2 - 10.1145/3655693.3655713

DO - 10.1145/3655693.3655713

M3 - Conference contribution/Paper

SP - 37

EP - 45

BT - EICC '24: Proceedings of the 2024 European Interdisciplinary Cybersecurity Conference

PB - Association for Computing Machinery (ACM)

CY - New York

ER -