Log Analysis of Cyber Security Training Exercises

被引:16
作者
Abbott, Robert G. [1 ]
McClain, Jonathan [1 ]
Anderson, Benjamin [1 ]
Nauer, Kevin [1 ]
Silva, Austin [1 ]
Forsythe, Chris [1 ]
机构
[1] Sandia Natl Labs, POB 5800, Albuquerque, NM 87185 USA
来源
6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015 | 2015年 / 3卷
关键词
Cyber security; Computer security; Human performance; log analysis; Activity recognition;
D O I
10.1016/j.promfg.2015.07.523
中图分类号
B84 [心理学]; C [社会科学总论]; Q98 [人类学];
学科分类号
03 ; 0303 ; 030303 ; 04 ; 0402 ;
摘要
Cyber security is a pervasive issue that impacts public and private organizations. While several published accounts describe the task demands of cyber security analysts, it is only recently that research has begun to investigate the cognitive and performance factors that distinguish novice from expert cyber security analysts. Research in this area is motivated by the need to understand how to better structure the education and training of cyber security professionals, a desire to identify selection factors that are predictive of professional success in cyber security and questions related to the development of software tools to augment human performance of cyber security tasks. However, a common hurdle faced by researchers involves gaining access to cyber security professionals for data collection activities, whether controlled experiments or semi-naturalistic observations. An often readily available and potentially valuable source of data may be found in the records generated through cyber security training exercises. These events frequently entail semi-realistic challenges that may be modeled on real-world occurrences, and occur outside normal operational settings, freeing participants from the sensitivities regarding information disclosure within operational environments. This paper describes an infrastructure tailored for the collection of human performance data within the context of cyber security training exercises. Techniques are described for mining the resulting data logs for relevant human performance variables. The results provide insights that go beyond current descriptive accounts of the cognitive processes and demands associated with cyber security job performance, providing quantitative characterizations of the activities undertaken in solving problems within this domain. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:5088 / 5094
页数:7
相关论文
共 17 条
[1]  
[Anonymous], 1 INT WORKSH MIX IN
[2]  
D'Amico A., 2005, P HUM FACT ERG SOC A
[3]   A multi-phase network situational awareness cognitive task analysis [J].
Erbacher, Robert F. ;
Frincke, Deborah A. ;
Wong, Pak Chung ;
Moody, Sarah ;
Fink, Glenn .
INFORMATION VISUALIZATION, 2010, 9 (03) :204-219
[4]  
Forsythe C., 2013, P HUM COMP INT INT C
[5]   Developing expertise for network intrusion detection [J].
Goodall, John R. ;
Lutters, Wayne G. ;
Komlodi, Anita .
INFORMATION TECHNOLOGY & PEOPLE, 2009, 22 (02) :92-108
[6]  
GOODALL JR, 2004, P 2004 ACM C COMP SU
[7]  
Jariwala S., 2012, P HUM FACT ERG SOC A
[8]  
McClain J. T., 2015, P APPL HUM FACT ERG
[9]  
Paul C. L., 2013, HUMAN ASPECTS INFORM
[10]  
Reed T., 2014, P 2014 INT ANN M HUM