CyTrONE: An Integrated Cybersecurity Training Framework

Razvan Beuran, Cuong Pham, Dat Tang, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda

2017

Abstract

In a world in which cyber-attacks occur on a daily basis, cybersecurity education and training are indispensable. Current training programs rely on manual setup and configuration for hands-on activities, which is a tedious and error-prone task. In this paper we present CyTrONE, an integrated cybersecurity training framework that we designed and implemented to address such shortcomings. The key insight is automating the training content generation and environment setup tasks. The advantages of this approach are: (i) improve the accuracy of the training setup; (ii) decrease the setup time and cost; (iii) make training possible repeatedly, and for a large number of participants. In the paper we thoroughly discuss the architecture and implementation of the framework, and we evaluate it from several perspectives in order to demonstrate that CyTrONE meets the aforementioned objectives.

References

  1. ing. Technical Report IS-RR-2016-003, Japan Ad-
  2. Crockford, D. (2006). IETF RFC 4627: The application/json Media Type for JavaScript Object Notation (JSON) . In Internet Requests for Comments, Internet Engineering Task Force.
  3. Danyliw, R., Meijer, J., and Demchenko, Y. (2007). Incident Object Description Exchange Format (IODEF), IETF RFC 5070.
  4. ITU-T. Revised structured cybersecurity information exchange technique. Recommendation X.1500 (2011) Amendment 9 (03/16).
  5. Ministry of Internal Affairs and Communications (MIC), Japan. Cyber Defense Exercise with Recurrence (CYDER) Training Program (press release). http://www.soumu.go.jp/main sosiki/joho tsusin/eng/ Releases/Telecommunications/130925 02.html.
  6. Pham, C., Tang, D., Chinen, K., and Beuran, R. (2016). CyRIS: A Cyber Range Instantiation System for Facilitating Security Training. In Proceedings of the International Symposium on Information and Communication Technology (SoICT).
  7. Raj, A. S., Alangot, B., Prabhu, S., and Achuthan, K. (2016). Scalable and Lightweight CTF Infrastructures Using Application Containers. In Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 7816).
Download


Paper Citation


in Harvard Style

Beuran R., Pham C., Tang D., Chinen K., Tan Y. and Shinoda Y. (2017). CyTrONE: An Integrated Cybersecurity Training Framework . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 157-166. DOI: 10.5220/0006206401570166


in Bibtex Style

@conference{icissp17,
author={Razvan Beuran and Cuong Pham and Dat Tang and Ken-ichi Chinen and Yasuo Tan and Yoichi Shinoda},
title={CyTrONE: An Integrated Cybersecurity Training Framework},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={157-166},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006206401570166},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - CyTrONE: An Integrated Cybersecurity Training Framework
SN - 978-989-758-209-7
AU - Beuran R.
AU - Pham C.
AU - Tang D.
AU - Chinen K.
AU - Tan Y.
AU - Shinoda Y.
PY - 2017
SP - 157
EP - 166
DO - 10.5220/0006206401570166