Visible to the public Synthesizing perception based on analysis of cyber attack environments

TitleSynthesizing perception based on analysis of cyber attack environments
Publication TypeConference Paper
Year of Publication2014
AuthorsSunny, S., Pavithran, V., Achuthan, K.
Conference NameAdvances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on
Date PublishedSept
Keywordsadversory behavior, analytic hierarchy process, assets protection, Computer crime, computer games, Computer hacking, cyber attack aggression, cyber attack environments, cyber attack intensity, cyber intensive games, cyber situational awareness, Cyber situational awreness, defensive activities, Equations, Framework, Games, hackers, Hacking, InCTF characteristics, India CTF, Measurement, offensive activities, perception synthesis, social aspects of automation, toxicity metrics, vulnerabilities types, Vulnerability
Abstract

Analysing cyber attack environments yield tremendous insight into adversory behavior, their strategy and capabilities. Designing cyber intensive games that promote offensive and defensive activities to capture or protect assets assist in the understanding of cyber situational awareness. There exists tangible metrics to characterizing games such as CTFs to resolve the intensity and aggression of a cyber attack. This paper synthesizes the characteristics of InCTF (India CTF) and provides an understanding of the types of vulnerabilities that have the potential to cause significant damage by trained hackers. The two metrics i.e. toxicity and effectiveness and its relation to the final performance of each team is detailed in this context.

URLhttp://ieeexplore.ieee.org/document/6968639/
DOI10.1109/ICACCI.2014.6968639
Citation Key6968639