Security Operations Center in Education: Building an Educational Environment for Attack and Defense Scenarios

Georgios Gerontakis, I. Voyiatzis, P. Yannakopoulos
{"title":"Security Operations Center in Education: Building an Educational Environment for Attack and Defense Scenarios","authors":"Georgios Gerontakis, I. Voyiatzis, P. Yannakopoulos","doi":"10.1145/3575879.3575962","DOIUrl":null,"url":null,"abstract":"The growing need to deal with modern and complex cyber threats and attacks, leads to an increase in the demand for human resources and expertise in the field of Cybersecurity, specifically in the field of monitoring and detecting these threats in the Security Operations sector. In this paper, we present already existing academic experience and literature about Cybersecurity training related topics, through attack and defense scenarios in a specially configured environment, which for the purposes of defense includes a Security Operations Center and for the purposes of the attack includes specially configured information systems which are intentionally vulnerable. Our results indicate that while there is existing literature available regarding the creation of functional SOC for educational purposes, it is not combined or used with applied attack and defense scenarios. There are also no instructions for practical use of the available information for educational purposes. We propose a theoretical structure and topology of an environment that can be used for applied training in Cybersecurity through attack scenarios using intentionally vulnerable information systems as targets and defense scenarios using a SOC to detect and respond to those attacks.","PeriodicalId":164036,"journal":{"name":"Proceedings of the 26th Pan-Hellenic Conference on Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 26th Pan-Hellenic Conference on Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3575879.3575962","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The growing need to deal with modern and complex cyber threats and attacks, leads to an increase in the demand for human resources and expertise in the field of Cybersecurity, specifically in the field of monitoring and detecting these threats in the Security Operations sector. In this paper, we present already existing academic experience and literature about Cybersecurity training related topics, through attack and defense scenarios in a specially configured environment, which for the purposes of defense includes a Security Operations Center and for the purposes of the attack includes specially configured information systems which are intentionally vulnerable. Our results indicate that while there is existing literature available regarding the creation of functional SOC for educational purposes, it is not combined or used with applied attack and defense scenarios. There are also no instructions for practical use of the available information for educational purposes. We propose a theoretical structure and topology of an environment that can be used for applied training in Cybersecurity through attack scenarios using intentionally vulnerable information systems as targets and defense scenarios using a SOC to detect and respond to those attacks.
应对现代和复杂的网络威胁和攻击的需求日益增长,导致对网络安全领域人力资源和专业知识的需求增加,特别是在安全运营部门监控和检测这些威胁的领域。在本文中,我们通过特殊配置环境中的攻击和防御场景,介绍了关于网络安全培训相关主题的现有学术经验和文献,该环境中的防御目的包括安全运营中心,攻击目的包括专门配置的易受攻击的信息系统。我们的研究结果表明,虽然有关于为教育目的创建功能SOC的现有文献,但它没有与应用攻击和防御场景相结合或使用。也没有说明实际使用现有的信息用于教育目的。我们提出了一个环境的理论结构和拓扑结构,该环境可用于网络安全应用培训,通过使用故意易受攻击的信息系统作为目标的攻击场景和使用SOC检测和响应这些攻击的防御场景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信