Papers
Topics
Authors
Recent
Search
2000 character limit reached

SCORPION Cyber Range: Fully Customizable Cyberexercises, Gamification, and Learning Analytics to Train Cybersecurity Competencies

Published 23 Jan 2024 in cs.CR and cs.CY | (2401.12594v4)

Abstract: It is undeniable that we are witnessing an unprecedented digital revolution. However, recent years have been characterized by the explosion of cyberattacks, making cybercrime one of the most profitable businesses on the planet. That is why training in cybersecurity is increasingly essential to protect the assets of cyberspace. One of the most vital tools to train cybersecurity competencies is the Cyber Range, a virtualized environment that simulates realistic networks. The paper at hand introduces SCORPION, a fully functional and virtualized Cyber Range, which manages the authoring and automated deployment of scenarios. In addition, SCORPION includes several elements to improve student motivation, such as a gamification system with medals, points, or rankings, among other elements. Such a gamification system includes an adaptive learning module that is able to adapt the cyberexercise based on the users' performance. Moreover, SCORPION leverages learning analytics that collects and processes telemetric and biometric user data, including heart rate through a smartwatch, which is available through a dashboard for instructors. Finally, we developed a case study where SCORPION obtained 82.10% in usability and 4.57 out of 5 in usefulness from the viewpoint of a student and an instructor. The positive evaluation results are promising, indicating that SCORPION can become an effective, motivating, and advanced cybersecurity training tool to help fill current gaps in this context.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (31)
  1. doi:10.3390/s20164636.
  2. doi:https://doi.org/10.1016/j.jnca.2022.103511. URL https://www.sciencedirect.com/science/article/pii/S1084804522001527
  3. doi:10.3390/s19071492.
  4. doi:10.1007/978-3-319-77492-3_7.
  5. doi:10.1145/3199674.
  6. doi:https://doi.org/10.1016/j.jnca.2022.103540. URL https://www.sciencedirect.com/science/article/pii/S1084804522001813
  7. doi:https://doi.org/10.1016/j.cosrev.2021.100361.
  8. doi:10.3390/APP11041809.
  9. doi:10.1109/FIE.2017.8190712.
  10. doi:10.18608/jla.2016.32.11.
  11. doi:10.3390/educsci11020069. URL https://www.mdpi.com/2227-7102/11/2/69
  12. arXiv:2010.06850, doi:10.3390/s20247148.
  13. doi:10.1016/j.cose.2019.101636.
  14. doi:10.5220/0006428203100321.
  15. doi:10.1145/3465481.3469188.
  16. doi:10.3390/s22145104. URL https://www.mdpi.com/1424-8220/22/14/5104
  17. doi:10.3390/app10134482. URL https://www.mdpi.com/2076-3417/10/13/4482
  18. doi:10.1145/3299815.3314438.
  19. doi:10.1145/3424954.3424959.
  20. doi:10.1109/ACCESS.2022.3182383.
  21. arXiv:2006.14352, doi:10.1109/ACCESS.2020.3009748.
  22. doi:10.1016/j.comnet.2022.108878.
  23. doi:10.2196/21161.
  24. doi:10.1145/2583008.2583017.
  25. K. B. Vekaria, P. Calyam, S. Wang, R. Payyavula, M. Rockey, N. Ahmed, Cyber range for research-inspired learning of “attack defense by pretense” principle and practice, IEEE Transactions on Learning Technologies 14 (3) (2021) 322–337. doi:10.1109/TLT.2021.3091904.
  26. doi:10.1007/s11423-020-09793-2.
  27. doi:10.3390/s150204097.
  28. doi:10.1016/j.chb.2014.07.002.
  29. doi:10.1109/ACCESS.2022.3163253.
  30. doi:10.1080/15391523.2020.1867938.
  31. doi:10.1007/978-3-319-40165-2_18.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 20 likes about this paper.