Architecture of a cyber defense competition
نویسندگان
چکیده
This paper describes the effort involve in executing a Cyber Defense Exercise while focusing on the White Cell and Red Forces activities during the 2003 Inter-Academy Cyber Defense Exercise (CDX). These exercise components were led by the National Security Agency and were comprised of security professionals from Carnegie Mellon University’s CERT, the United States Air Force, and the United States Army. This handson exercise provided the capstone educational experience for information assurance students at the U. S. service academies. The White Cell developed the scenarios and anomalies, established the scoring criteria, refereed the exercise, and determined the winner based on the effectiveness of each academy to minimize the impact to their networks from the Red Forces network intelligence gathering, intrusion, attack and evaluation. To understand better all that is involved this paper takes advantage of the authors three years of experience in directing the activities associated with the planning and execution of the 2003 exercise. ∗ U.S. Government work not protected by U.S. copyright Ι This work was partially supported by an endowment establishing the Adam Chair in Information Technology. The views expressed herein are those of the authors and do not purport to reflect the position of the United States Military Academy, the Department of the Army, or the Department of Defense.
منابع مشابه
Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling
The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches. In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques. Jump processes are applied to model different and complex situations in cyber games. Applying jump processes we propose some m...
متن کاملDeveloping Cyber Competition Infrastructure Using the SCRUM Framework
In March 2012, the Rocky Mountain Collegiate Cyber Defense Competition (RMCCDC) was hosted at Regis University and attended by seven colleges from the region. CCDC was developed by the University of Texas in San Antonio to provide a structured environment for practical education tied to established information assurance learning objectives in the implementation of security techniques, strategie...
متن کاملInitial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense
This report describes an initial reference architecture for intelligent software agents performing active, largely autonomous cyber defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152"Intelligent Autonomous Agents for Cyber Defense and Resilience". In a conflict wit...
متن کاملSetting up and Using a Cyber Security Lab for Education Purposes
An indispensable component of cyber security education is hands-on activities carried out in a lab to enable students to understand both offense and defense aspects of the cyber space. We describe our design and implementation of this course, and a resulting student organization Cyber Defense Club (CDC), at Kansas State University. Our 1.5-year experience in teaching this course and advising th...
متن کاملFederated Cloud Security Architecture for Secure and Agile Clouds
Cyber threats against clouds have evolved rapidly. Traditional reactive cyber defense technologies are not effective and sufficient to protect federated clouds. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set of seamlessly integ...
متن کامل