TY - GEN
T1 - Hit 'em where it hurts
T2 - 27th Annual Computer Security Applications Conference, ACSAC 2011
AU - Doupé, Adam
AU - Egele, Manuel
AU - Caillat, Benjamin
AU - Stringhini, Gianluca
AU - Yakin, Gorkem
AU - Zand, Ali
AU - Cavedon, Ludovico
AU - Vigna, Giovanni
PY - 2011
Y1 - 2011
N2 - Live security exercises are a powerful educational tool to motivate students to excel and foster research and development of novel security solutions. Our insight is to design a live security exercise to provide interesting datasets in a specific area of security research. In this paper we validated this insight, and we present the design of a novel kind of live security competition centered on the concept of Cyber Situational Awareness. The competition was carried out in December 2010, and involved 72 teams (900 students) spread across 16 countries, making it the largest educational live security exercise ever performed. We present both the innovative design of this competition and the novel dataset we collected. In addition, we define Cyber Situational Awareness metrics to characterize the toxicity and effectiveness of the attacks performed by the participants with respect to the missions carried out by the targets of the attack
AB - Live security exercises are a powerful educational tool to motivate students to excel and foster research and development of novel security solutions. Our insight is to design a live security exercise to provide interesting datasets in a specific area of security research. In this paper we validated this insight, and we present the design of a novel kind of live security competition centered on the concept of Cyber Situational Awareness. The competition was carried out in December 2010, and involved 72 teams (900 students) spread across 16 countries, making it the largest educational live security exercise ever performed. We present both the innovative design of this competition and the novel dataset we collected. In addition, we define Cyber Situational Awareness metrics to characterize the toxicity and effectiveness of the attacks performed by the participants with respect to the missions carried out by the targets of the attack
UR - http://www.scopus.com/inward/record.url?scp=84855700747&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84855700747&partnerID=8YFLogxK
U2 - 10.1145/2076732.2076740
DO - 10.1145/2076732.2076740
M3 - Conference contribution
AN - SCOPUS:84855700747
SN - 9781450306720
T3 - ACM International Conference Proceeding Series
SP - 51
EP - 61
BT - Proceedings - 27th Annual Computer Security Applications Conference, ACSAC 2011
Y2 - 5 December 2011 through 9 December 2011
ER -