Paper
12 June 2023 Cyberspace exercises: defending against malicious cyber actors
Kelly Bennett, James Robertson
Author Affiliations +
Abstract
Malicious cyber actors are well-prepared and trained to negatively impact organizations, assets, or individuals. Training exercises help to mitigate these adverse effects by enabling cyber defense analysts to demonstrate their abilities to respond to cyber incidents in real-time. When a security incident occurs, the response team must quickly contain the situation, diagnose the problem, and return to a previous good state so the system down time is minimized, and the issue does not spread to other systems. Training exercises allow both red (attack) and blue (defense) teams to practice in a secure, isolated environment ensuring all team members have the necessary experience if and when incidents occur. This paper describes simulated cybersecurity research scenarios based on open-source data repositories of adversary tactics and techniques including published frameworks by MITRE and NIST. Artificial Intelligence/Machine Learning (AI/ML) techniques and methods supporting cybersecurity research will also be discussed with an emphasis towards cloud environment frameworks. Results from using AL/ML techniques, cloud-based tools and methods, cyber tabletop exercises for cybersecurity research scenarios and use cases will be included.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Kelly Bennett and James Robertson "Cyberspace exercises: defending against malicious cyber actors", Proc. SPIE 12538, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications V, 125380F (12 June 2023); https://doi.org/10.1117/12.2663514
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Clouds

Information security

Computer security

Computing systems

Control systems

Education and training

Data backup

Back to Top