AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition

被引:11
作者
Zacharis, Alexandros [1 ]
Patsakis, Constantinos [2 ,3 ]
机构
[1] European Union Agcy Cybersecur ENISA, Athens, Greece
[2] Univ Piraeus, Dept Informat, Karaoli & Dimitriou 80, Piraeus 18534, Greece
[3] Athena Res Ctr, Maroussi, Greece
关键词
Cyber security exercise scenario; Artificial intelligence; Cyber security exercise ontology; SECURITY EXERCISES;
D O I
10.1007/s10207-023-00693-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Content generation that is both relevant and up to date with the current threats of the target audience is a critical element in the success of any cyber security exercise (CSE). Through this work, we explore the results of applying machine learning techniques to unstructured information sources to generate structured CSE content. The corpus of our work is a large dataset of publicly available cyber security articles that have been used to predict future threats and to form the skeleton for new exercise scenarios. Machine learning techniques, like named entity recognition and topic extraction, have been utilised to structure the information based on a novel ontology we developed, named Cyber Exercise Scenario Ontology (CESO). Moreover, we used clustering with outliers to classify the generated extracted data into objects of our ontology. Graph comparison methodologies were used to match generated scenario fragments to known threat actors' tactics and help enrich the proposed scenario accordingly with the help of synthetic text generators. CESO has also been chosen as the prominent way to express both fragments and the final proposed scenario content by our AI-assisted Cyber Exercise Framework. Our methodology was assessed by providing a set of generated scenarios for evaluation to a group of experts to be used as part of a real-world awareness tabletop exercise.
引用
收藏
页码:1333 / 1354
页数:22
相关论文
共 49 条
[11]  
European Commission, 2022, DIR EU 2020 2555 EUR
[12]  
Furtuna A, 2010, PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), P415, DOI 10.1109/ICCOMM.2010.5509123
[13]   Measuring team effectiveness in cyber-defense exercises: a cross-disciplinary case study [J].
Granasen, Magdalena ;
Andersson, Dennis .
COGNITION TECHNOLOGY & WORK, 2016, 18 (01) :121-143
[14]  
Green A., 2013, AMCIS 2013 P, V1, P257
[15]  
Gurnani R, 2014, 2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), P680, DOI 10.1109/IndiaCom.2014.6828048
[16]  
ISO Central Secretary, 2013, ISO223982013
[17]  
Karagiannis S., 2021, Advances in Core Computer ScienceBased Technologies: Papers in Honor of Professor Nikolaos Alexandris, P55, DOI [DOI 10.1007/978-3-030-41196-14, 10.1007/978-3-030-41196-1_4]
[18]   Pedagogical Aspects of Cyber Security Exercises [J].
Karjalainen, Mika ;
Kokkonen, Tero ;
Puuska, Samir .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, :103-108
[19]  
Kick J., 2014, Cyber Exercise Playbook
[20]   Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform [J].
Li, Yue ;
Liljenstam, Michael ;
Liu, Jason .
PADS 2009: 23RD WORKSHOP ON PRINCIPLES OF ADVANCED AND DISTRIBUTED SIMULATION, PROCEEDINGS, 2009, :54-+