2019
DOI: 10.1007/s11036-019-01442-0
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for the Evaluation of Trainee Performance in Cyber Range Exercises

Abstract: This paper proposes a novel approach for the evaluation of the performance achieved by trainees involved in cyber security exercises implemented through modern cyber ranges. Our main contributions include: the definition of a distributed monitoring architecture for gathering relevant information about trainees activities; an algorithm for modeling the trainee activities using directed graphs; novel scoring algorithms, based on graph operations, that evaluate different aspects (speed, precision) of a trainee du… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Our paper investigates the applicability of command-line data in educational assessment. Such data are collected in multiple state-of-the-art learning environments for cybersecurity training (Andreolini, Colacino, Colajanni, & Marchetti, 2019;Labuschagne & Grobler, 2017;Tian et al, 2018;Weiss, Turbak, Mache, & Locasto, 2017).…”
Section: Using Data For Student Assessment In Cybersecuritymentioning
confidence: 99%
“…Our paper investigates the applicability of command-line data in educational assessment. Such data are collected in multiple state-of-the-art learning environments for cybersecurity training (Andreolini, Colacino, Colajanni, & Marchetti, 2019;Labuschagne & Grobler, 2017;Tian et al, 2018;Weiss, Turbak, Mache, & Locasto, 2017).…”
Section: Using Data For Student Assessment In Cybersecuritymentioning
confidence: 99%
“…Still, it addresses a different application domain -puzzle-based cybersecurity training, aiming to utilize the specific data properties to deal with process mining challenges. Some papers also directly address the utilization of process mining for the analysis of hands-on cybersecurity exercises [1,30,31,35]. These approaches demonstrate that directed graphs carefully constructed from command history can provide useful information about trainees' behavior.…”
Section: Related Workmentioning
confidence: 99%
“…The system monitored terminal input and output and compared them with task milestones to automatically assess student progress. Similarly [34], [35] also implemented host-based logging to reconstruct the students' progress. Although the goal of the above-mentioned works is similar to ours, their approach is complementary.…”
Section: Collection and Analysis Of Cybersecurity Education Datamentioning
confidence: 99%