Synthesizing perception based on analysis of cyber attack environments
Title | Synthesizing perception based on analysis of cyber attack environments |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Sunny, S., Pavithran, V., Achuthan, K. |
Conference Name | Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on |
Date Published | Sept |
Keywords | adversory behavior, analytic hierarchy process, assets protection, Computer crime, computer games, Computer hacking, cyber attack aggression, cyber attack environments, cyber attack intensity, cyber intensive games, cyber situational awareness, Cyber situational awreness, defensive activities, Equations, Framework, Games, hackers, Hacking, InCTF characteristics, India CTF, Measurement, offensive activities, perception synthesis, social aspects of automation, toxicity metrics, vulnerabilities types, Vulnerability |
Abstract | Analysing cyber attack environments yield tremendous insight into adversory behavior, their strategy and capabilities. Designing cyber intensive games that promote offensive and defensive activities to capture or protect assets assist in the understanding of cyber situational awareness. There exists tangible metrics to characterizing games such as CTFs to resolve the intensity and aggression of a cyber attack. This paper synthesizes the characteristics of InCTF (India CTF) and provides an understanding of the types of vulnerabilities that have the potential to cause significant damage by trained hackers. The two metrics i.e. toxicity and effectiveness and its relation to the final performance of each team is detailed in this context. |
URL | http://ieeexplore.ieee.org/document/6968639/ |
DOI | 10.1109/ICACCI.2014.6968639 |
Citation Key | 6968639 |
- Equations
- Vulnerability
- vulnerabilities types
- toxicity metrics
- social aspects of automation
- perception synthesis
- offensive activities
- Measurement
- India CTF
- InCTF characteristics
- Hacking
- hackers
- Games
- framework
- adversory behavior
- defensive activities
- Cyber situational awreness
- cyber situational awareness
- cyber intensive games
- cyber attack intensity
- cyber attack environments
- cyber attack aggression
- Computer hacking
- computer games
- Computer crime
- assets protection
- analytic hierarchy process