PenQuest: a gamified attacker/defender meta model for cyber security assessment and education

被引:0
|
作者
Robert Luh
Marlies Temper
Simon Tjoa
Sebastian Schrittwieser
Helge Janicke
机构
[1] St. Pölten University of Applied Sciences,Josef Ressel Center TARGET
[2] St. Pölten University of Applied Sciences,Institute of IT Security Research
[3] De Montfort University,undefined
来源
Journal of Computer Virology and Hacking Techniques | 2020年 / 16卷
关键词
Security model; Serious game; Education; Awareness; Game theory; Attack patterns; Controls; Malware; Intrusion detection;
D O I
暂无
中图分类号
学科分类号
摘要
Attacks on IT systems are a rising threat against the confidentiality, integrity, and availability of critical information and infrastructures. At the same time, the complex interplay of attack techniques and possible countermeasures makes it difficult to appropriately plan, implement, and evaluate an organization’s defense. More often than not, the worlds of technical threats and organizational controls remain disjunct. In this article, we introduce PenQuest, a meta model designed to present a complete view on information system attacks and their mitigation while providing a tool for both semantic data enrichment and security education. PenQuest simulates time-enabled attacker/defender behavior as part of a dynamic, imperfect information multi-player game that derives significant parts of its ruleset from established information security sources such as STIX, CAPEC, CVE/CWE and NIST SP 800-53. Attack patterns, vulnerabilities, and mitigating controls are mapped to counterpart strategies and concrete actions through practical, data-centric mechanisms. The gamified model considers and defines a wide range of actors, assets, and actions, thereby enabling the assessment of cyber risks while giving technical experts the opportunity to explore specific attack scenarios in the context of an abstracted IT infrastructure. We implemented PenQuest as a physical serious game prototype and successfully tested it in a higher education environment. Additional expert interviews helped evaluate the model’s applicability to information security scenarios.
引用
收藏
页码:19 / 61
页数:42
相关论文
共 28 条
  • [1] PenQuest: a gamified attacker/defender meta model for cyber security assessment and education
    Luh, Robert
    Temper, Marlies
    Tjoa, Simon
    Schrittwieser, Sebastian
    Janicke, Helge
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2020, 16 (01) : 19 - 61
  • [2] APT RPG: Design of a Gamified Attacker/Defender Meta Model
    Luh, Robert
    Temper, Marlies
    Tjoa, Simon
    Schrittwieser, Sebastian
    ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 526 - 537
  • [3] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent
    Grijalva, Santiago
    2020 CLEMSON UNIVERSITY POWER SYSTEMS CONFERENCE (PSC), 2020,
  • [4] Grid Cyber-Security Strategy in an Attacker-Defender Model
    Chen, Yu-Cheng
    Mooney, Vincent John, III
    Grijalva, Santiago
    CRYPTOGRAPHY, 2021, 5 (02)
  • [5] A Review of Attacker-Defender Games and Cyber Security
    Hausken, Kjell
    Welburn, Jonathan W.
    Zhuang, Jun
    GAMES, 2024, 15 (04):
  • [6] Cyber security based on mean field game model of the defender: Attacker strategies
    Miao, Li
    Li, Shuai
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (10): : 1 - 8
  • [7] Attacker-defender model against quantal response adversaries for cyber security in logistics management: An introductory study
    Cheung, Kam-Fung
    Bell, Michael G. H.
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2021, 291 (02) : 471 - 481
  • [8] Cyber Security: A game-theoretic analysis of defender and attacker strategies in defacing-website games
    Aggarwal, Palvi
    Grover, Antra
    Singh, Saumya
    Maqbool, Zahid
    Pammi, V. S. Chandrasekhar
    Dutt, Varun
    2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), 2015,
  • [9] A Maturity Assessment Model for Cyber Security Education in Europe
    Vidor, Silvia
    Budde, Carlos E.
    INFORMATION SECURITY EDUCATION - ADAPTING TO THE FOURTH INDUSTRIAL REVOLUTION, WISE 2022, 2022, 650 : 60 - 74
  • [10] Cyber Gamification: Implementing Gamified Adaptive Learning Environments for Effective Cyber Security Teams Education
    Alothman, Basil
    2024 5TH INTERNATIONAL CONFERENCE ON EDUCATION DEVELOPMENT AND STUDIES, ICEDS 2024, 2024, : 33 - 40