Bridging the gap: A pragmatic approach to generating insider threat data

J Glasser, B Lindauer - 2013 IEEE Security and Privacy …, 2013 - ieeexplore.ieee.org
The threat of malicious insider activity continues to be of paramount concern in both the
public and private sectors. Though there is great interest in advancing the state of the art in …

Cyber ranges and testbeds for education, training, and research

N Chouliaras, G Kittes, I Kantzavelou, L Maglaras… - Applied Sciences, 2021 - mdpi.com
In recent years, there has been a growing demand for cybersecurity experts, and, according
to predictions, this demand will continue to increase. Cyber Ranges can fill this gap by …

A model-driven framework for guided design space exploration

Á Hegedüs, Á Horváth, D Varró - Automated Software Engineering, 2015 - Springer
Abstract Design space exploration (DSE) aims at searching through various models
representing different design candidates to support activities like configuration design of …

[PDF][PDF] Generating Test Data for Insider Threat Detectors.

B Lindauer, J Glasser, M Rosen, KC Wallnau… - J. Wirel. Mob. Networks …, 2014 - isyou.info
The threat of malicious insider activity continues to be of paramount concern in both the
public and private sectors. Though there is great interest in advancing the state of the art in …

Ghosts in the machine: A framework for cyber-warfare exercise npc simulation

D Updyke, GB Dobson, TG Podnar, LJ Osterritter… - 2018 - kilthub.cmu.edu
This report introduces the GHOSTS ((G) eneral HOSTS) framework, the purpose of which is
to create a high level of realism in cyber-warfare exercises by establishing and building …

Simulating Malicious Insiders in Real {Host-Monitored} User Data

K Wallnau, B Lindauer, M Theis, R Durst… - 7th Workshop on Cyber …, 2014 - usenix.org
Our task is to produce test data for a research program developing a new generation of
insider threat detection technologies. Test data is created by injecting fictional malicious …

Representing attacks in a cyber range

N Hätty - 2019 - diva-portal.org
Trained security experts can be a mitigating factor to sophisticated cyberattacks that aim to
violate the confidentiality, integrity, and availability of information. Reproducible sessions in …

[PDF][PDF] Generating realistic background traffic

A Defer - 2023 - cylab.be
Realistic traffic generation is a major issue nowadays. It allows to simulate an infinite
number of possible computer attack scenarios in order to train cybersecurity professionals in …

Data-driven multi-agent email generators

E Stayton, A Roque - 2018 IEEE International Symposium on …, 2018 - ieeexplore.ieee.org
We present a method for generating realistic-looking emails for multi-agent simulations,
motivated by the needs of cyber ranges. Our approach uses a distributed model of email …