AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition

被引:11
作者
Zacharis, Alexandros [1 ]
Patsakis, Constantinos [2 ,3 ]
机构
[1] European Union Agcy Cybersecur ENISA, Athens, Greece
[2] Univ Piraeus, Dept Informat, Karaoli & Dimitriou 80, Piraeus 18534, Greece
[3] Athena Res Ctr, Maroussi, Greece
关键词
Cyber security exercise scenario; Artificial intelligence; Cyber security exercise ontology; SECURITY EXERCISES;
D O I
10.1007/s10207-023-00693-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content generation that is both relevant and up to date with the current threats of the target audience is a critical element in the success of any cyber security exercise (CSE). Through this work, we explore the results of applying machine learning techniques to unstructured information sources to generate structured CSE content. The corpus of our work is a large dataset of publicly available cyber security articles that have been used to predict future threats and to form the skeleton for new exercise scenarios. Machine learning techniques, like named entity recognition and topic extraction, have been utilised to structure the information based on a novel ontology we developed, named Cyber Exercise Scenario Ontology (CESO). Moreover, we used clustering with outliers to classify the generated extracted data into objects of our ontology. Graph comparison methodologies were used to match generated scenario fragments to known threat actors' tactics and help enrich the proposed scenario accordingly with the help of synthetic text generators. CESO has also been chosen as the prominent way to express both fragments and the final proposed scenario content by our AI-assisted Cyber Exercise Framework. Our methodology was assessed by providing a set of generated scenarios for evaluation to a group of experts to be used as part of a real-world awareness tabletop exercise.
引用
收藏
页码:1333 / 1354
页数:22
相关论文
共 49 条
[1]  
Adams W.J., 2009, CSET
[2]  
[Anonymous], 2007, 2007 40 ANN HAWAII I
[3]  
Augustine T., 2006, P 10 C INF SYST SEC
[4]  
Brown T. B., arXiv
[5]  
Conklin A., 2006, Proceedings of the 39th Hawaii International Conference on System Sciences, V9, p220b, DOI DOI 10.1109/HICSS.2006.110
[6]  
Conklin A., 2005, Proceedings of the 2Nd Annual Conference on Information Security Curriculum Development, P16
[7]   GENERALIZATION OF SCOTTS INDEX OF INTERCODER AGREEMENT [J].
CRAIG, RT .
PUBLIC OPINION QUARTERLY, 1981, 45 (02) :260-264
[8]  
Dewar R. S., 2018, Tech. Rep
[9]   Organized cyber defense competitions [J].
Dodge, RC ;
Ragsdale, DJ .
IEEE INTERNATIONAL CONFERENCE ON ADVANCED LEARNING TECHNOLOGIES, PROCEEDINGS, 2004, :768-770
[10]   Standards-Based Cyber Exercises [J].
Dodge, Ronald C., Jr. ;
Hay, Brian ;
Nance, Kara .
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, :738-+