Acceso abierto

Enhancing Cybersecurity Readiness Through the Red and Blue Team Competition

 y   
30 ago 2024

Cite
Descargar portada

Andreolini M., Colacino V.G., Colajanni M., Marchetti M., A framework for the evaluation of trainee performance in cyber range exercises, Mobile Networks and Applications, vol. 25, pp. 236–247, 2020. Search in Google Scholar

Attiah A., Chatterjee M., Zou C.C., A game theoretic approach to model cyber attack and defense strategies, in International Conference on Communications, Kansas City, MO, USA, 2018, pp. 1–7. Search in Google Scholar

Bock K., Hughey G., Levin D., King of the hill: A novel cybersecurity competition for teaching penetration testing, in USENIX Workshop on Advances in Security Education, Baltimore, MD, 2018. Search in Google Scholar

Brilingaitė A., Bukauskas L., Juozapavičius A., A framework for competence development and assessment in hybrid cybersecurity exercises, Computers Security, vol. 88, p. 101607, 2020. Search in Google Scholar

Chindruș C., Căruntu C.F., Development and Testing of a Core System for Red and Blue Scenario in Cyber Security Incidents, 2022 15th International Conference on Security of Information and Networks (SIN), Sousse, Tunisia, 2022, pp. 1-7. Search in Google Scholar

Cheung R.S., Cohen J.P., Lo H.Z., Elia F., Carrillo-Marquez V., Effectiveness of cybersecurity competitions, in International Conference on Security and Management. Las Vegas, USA: The Steering Committee of The World Congress in Computer Science, 2012, p. 1. Search in Google Scholar

DeCusatis C., Bavaro J., Cannistraci T., Griffin B., Jenkins J., Ronan M., Red-Blue team exercises for cybersecurity training during a pandemic, in IEEE 11th Annual Computing and Communication Workshop and Conference, NV, USA, 2021, pp. 1055–1060. Search in Google Scholar

Haney J.M., Paul C.L., Toward integrated tactical operations for Red/Blue cyber defense teams, in Workshop on Security Information Workers at Symposium on Usable Privacy and Security, Baltimore, MD, USA, 2018. Search in Google Scholar

Karjalainen M., Kokkonen T., Comprehensive cyber arena; the next generation cyber range, in IEEE European Symposium on Security and Privacy Workshops, Genoa, Italy, 2020, pp. 11–16. Search in Google Scholar

Katsantonis M.N., Fouliras P., Mavridis I., Conceptual analysis of cyber security education based on live competitions, in IEEE Global Engineering Education Conference, Athens, Greece, 2017, pp. 771–779. Search in Google Scholar

Katsantonis M.N., Mavridis I., Gritzalis D., Design and evaluation of cofelet-based approaches for cyber security learning and training, Computers & Security, vol. 105, p. 102263, 2021. Search in Google Scholar

Khan M.A., Merabet A., Alkaabi S., Sayed H.E., Game-based learning platform to enhance cybersecurity education, Education and Information Technologies, pp. 1–25, 2022. Search in Google Scholar

Kokkonen T., Puuska S., Blue team communication and reporting for enhancing situational awareness from white team perspective in cyber security exercises, in Internet of things, smart spaces, and next generation networks and systems. Cham: Springer, 2018, pp. 277–288. Search in Google Scholar

Pusey P., Gondree M., Peterson Z., The outcomes of cybersecurity competitions and implications for underrepresented populations, IEEE Security & Privacy, vol. 14, no. 6, pp. 90–95, 2016. Search in Google Scholar

Seker E., Ozbenli H.H., The concept of cyber defence exercises (cdx): Planning, execution, evaluation, in International Conference on Cyber Security and Protection of Digital Services. Glasgow, UK: IEEE, 2018, pp. 1–9. Search in Google Scholar

Shen C.C., Chiou Y.-M., Mouza C., Rutherford T., Work-inprogress-design and evaluation of mixed reality programs for cybersecurity education, in 7th International Conference of the Immersive Learning Research Network. Eureka, CA, USA: IEEE, 2021, pp. 1–3. Search in Google Scholar

Thomas L.J., Balders M., Countney Z., Zhong C., Yao J., Xu C., Cybersecurity education: From beginners to advanced players in cybersecurity competitions, in International Conference on Intelligence and Security Informatics. Shenzhen, China: IEEE, 2019, pp. 149–151. Search in Google Scholar

Veerasamy N., High-level methodology for carrying out combined Red and Blue teams, in 2nd International Conference on Computer and Electrical Engineering, Dubai, United Arab Emirates, 2009, pp. 416–420. Search in Google Scholar

Vigna G., Teaching network security through live exercises, in Security Education and Critical Infrastructures, C. Irvine and H. Armstrong, Eds. New York, NY: Springer US, 2003, pp. 3–18. Search in Google Scholar

Yamin M.M., Katt B., Gkioulos V., Cyber ranges and security testbeds: Scenarios, functions, tools and architecture, Computers Security, vol. 88, p. 101636, 2020. Search in Google Scholar

Yang P., Gao F., Zhang H., Multi-player evolutionary game of network attack and defense based on system dynamics, Mathematics, vol. 9, no. 23, p. 3014, 2021. Search in Google Scholar

Zhang H., Jiang L., Huang S., Wang J., Zhang Y., Attack-defense differential game model for network defense strategy selection, IEEE Access, vol. 7, pp. 50 618–50 629, 2018 Search in Google Scholar