Visible to the public Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud

TitleDevelopment of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
Publication TypeConference Paper
Year of Publication2019
AuthorsPark, Y.S., Choi, C.S., Jang, C., Shin, D.G., Cho, G.C., Kim, Hwa Soo
Conference Name2019 International Workshop on Big Data and Information Security (IWBIS)
Keywordsactual information system, artificial intelligenc, artificial intelligence technology, CBT type remote education, cloud, cloud computing, composability, computer based training, Computer crime, computer science education, cyber security, cyber security experts, cyber security threats, cyber security training system, defense practice, government data processing, infringement incident response tool, Korean e-government framework, Korean government agency, Linux, Metrics, military war game modeling, Modeling and Simulation, pubcrawl, resilience, Resiliency, scenario based infringement incident response training, Secure Coding, virtualisation, virtualization-based infringement incident response tool, vulnerability measure practice, Window operating system environments, Windows Operating System Security
Abstract

We developed a virtualization-based infringement incident response tool for cyber security training system using Cloud. This tool was developed by applying the concept of attack and defense which is the basic of military war game modeling and simulation. The main purpose of this software is to cultivate cyber security experts capable of coping with various situations to minimize the damage in the shortest time when an infringement incident occurred. This tool acquired the invaluable certificate from Korean government agency. This tool shall provide CBT type remote education such as scenario based infringement incident response training, hacking defense practice, and vulnerability measure practice. The tool works in Linux, Window operating system environments, and uses Korean e-government framework and secure coding to construct a situation similar to the actual information system. In the near future, Internet and devices connected to the Internet will be greatly enlarged, and cyber security threats will be diverse and widespread. It is expected that various kinds of hacking will be attempted in an advanced types using artificial intelligence technology. Therefore, we are working on applying the artificial intelligence technology to the current infringement incident response tool to cope with these evolving threats.

URLhttps://ieeexplore.ieee.org/document/8935723/
DOI10.1109/IWBIS.2019.8935723
Citation Keypark_development_2019