Park et al., 2019 - Google Patents
Development of incident response tool for cyber security training based on virtualization and cloudPark et al., 2019
- Document ID
- 6928121559777667243
- Author
- Park Y
- Choi C
- Jang C
- Shin D
- Cho G
- Kim H
- Publication year
- Publication venue
- 2019 International Workshop on Big Data and Information Security (IWBIS)
External Links
Snippet
We developed a virtualization-based infringement incident response tool for cyber security training system using Cloud. This tool was developed by applying the concept of attack and defense which is the basic of military war game modeling and simulation. The main purpose …
- 230000004044 response 0 title abstract description 17
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2207/00—Indexing scheme relating to methods or arrangements for processing data by operating upon the order or content of the data handled
- G06F2207/72—Indexing scheme relating to groups G06F7/72 - G06F7/729
- G06F2207/7219—Countermeasures against side channel or fault attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computer systems based on biological models
- G06N3/02—Computer systems based on biological models using neural network models
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aldawood et al. | An academic review of current industrial and commercial cyber security social engineering solutions | |
Kick | Cyber exercise playbook | |
Sharma et al. | Teaching information systems security courses: A hands-on approach | |
Kavak et al. | A characterization of cybersecurity simulation scenarios. | |
Ashley et al. | Gamification of cybersecurity for workforce development in critical infrastructure | |
Couretas | An introduction to cyber modeling and simulation | |
Rieb et al. | Operation digital chameleon: towards an open cybersecurity method | |
Scherb et al. | A cyber attack simulation for teaching cybersecurity | |
Dawson et al. | Applying software assurance and cybersecurity NICE job tasks through secure software engineering labs | |
Hamoud et al. | Handling user-oriented cyber-attacks: STRIM, a user-based security training model | |
Hu et al. | A dimensional perspective analysis on the cybersecurity risks and opportunities of chatgpt-like information systems | |
Park et al. | Development of incident response tool for cyber security training based on virtualization and cloud | |
Natella et al. | AI Code Generators for Security: Friend or Foe? | |
Scherb et al. | A serious game for simulating cyberattacks to teach cybersecurity | |
Rani et al. | Comprehensive analysis of various cyber attacks | |
Null | Integrating security across the computer science curriculum | |
Chaskos | Cyber-security training: a comparative analysis of cyberranges and emerging trends | |
Ernits et al. | From simple scoring towards a meaningful interpretation of learning in cybersecurity exercises | |
Standard et al. | Network reconnaissance, attack, and defense laboratories for an introductory cyber-security course | |
Malik et al. | Mapping AICTE cybersecurity curriculum onto CyBOK: a case study | |
Savaglia et al. | CYBERSECURITY VULNERABILITY ANALYSIS VIA VIRTUALIZATION. | |
Riihelä | Teaching information security: A systematic mapping study | |
Grant | Speeding up planning of cyber attacks using AI techniques: State of the art | |
Wilson | Teaching security defense through web-based hacking at the undergraduate level | |
Puchkov et al. | Criteria for Classification of Cyber-training and Analysis of Organizational and Technical Platforms for Their Conduct. |